Max level shown:
12025-03-07T23:11:49.917ZDEBGtest_unauthorized (init_with_steps): Running step start_crdb
22025-03-07T23:11:49.919ZDEBGtest_unauthorized: Starting CRDB
32025-03-07T23:11:49.922ZINFOtest_unauthorized: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpUHeYbD
42025-03-07T23:11:49.922ZINFOtest_unauthorized: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/c7e96add76588bb61c541cdee3e6bde547013a2d7a1922650448109b1aa508ec.tar) to storage directory (/var/tmp/omicron_tmp/.tmpUHeYbD/data)
52025-03-07T23:11:49.971ZINFOtest_unauthorized: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpUHeYbD/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpUHeYbD/listen-url
62025-03-07T23:11:49.973ZINFOtest_unauthorized: cockroach environment: BUILDOMAT_JOB_ID=01JNSA4YD22FEAFSJR23D8FG9E BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-linux-gnu/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/c7e96add76588bb61c541cdee3e6bde547013a2d7a1922650448109b1aa508ec.tar GITHUB_BRANCH=more-manual-pagination GITHUB_REF=refs/heads/more-manual-pagination GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=1005669a265bdb3ebd76577e4c2bae3b77a65e55 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-f364c1f5c48ad17f/out:/work/oxidecomputer/omicron/target/debug/build/blake3-36967646666c7505/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-dac6ded7a7cf49d7/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-2a4a216cc75c0de2/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-1898e159cacaac33/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b7535f1ea7686967/out:/work/oxidecomputer/omicron/target/debug/build/tofino-9fc06c839e713e71/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-linux-gnu/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-f364c1f5c48ad17f/out:/work/oxidecomputer/omicron/target/debug/build/blake3-36967646666c7505/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-dac6ded7a7cf49d7/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-2a4a216cc75c0de2/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-1898e159cacaac33/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b7535f1ea7686967/out:/work/oxidecomputer/omicron/target/debug/build/tofino-9fc06c839e713e71/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-linux-gnu/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=f670ff0d-2bf7-4083-bb1a-fc4208f31178 NEXTEST_TEST_GLOBAL_SLOT=0 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-9dcdeaf400c17788/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.85.0-x86_64-unknown-linux-gnu RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/lib/ssl/certs SSL_CERT_FILE=/usr/lib/ssl/certs/ca-certificates.crt TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build __NEXTEST_ATTEMPT=1
72025-03-07T23:11:51.120ZINFOtest_unauthorized: cockroach pid: 211358
82025-03-07T23:11:51.128ZINFOtest_unauthorized: cockroach listen URL: postgresql://root@[::1]:34053/omicron?sslmode=disable
92025-03-07T23:11:51.128ZDEBGtest_unauthorized (init_with_steps): Running step start_clickhouse
102025-03-07T23:11:51.128ZDEBGtest_unauthorized: Starting Clickhouse
112025-03-07T23:11:51.652ZDEBGtest_unauthorized (init_with_steps): Running step start_gateway_switch0
122025-03-07T23:11:51.653ZDEBGtest_unauthorized: Starting Management Gateway
132025-03-07T23:11:51.815ZDEBGtest_unauthorized (init_with_steps): Running step start_dendrite_switch0
142025-03-07T23:11:51.815ZDEBGtest_unauthorized: Starting Dendrite for switch0
152025-03-07T23:11:51.833ZDEBGtest_unauthorized (init_with_steps): Running step start_mgd_switch0
162025-03-07T23:11:51.833ZDEBGtest_unauthorized: Starting mgd for switch0
172025-03-07T23:11:51.884ZDEBGtest_unauthorized: mgd port is 39787
182025-03-07T23:11:51.885ZDEBGtest_unauthorized (init_with_steps): Running step record_switch_dns
192025-03-07T23:11:51.885ZDEBGtest_unauthorized: Recording DNS for the switch zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 switch_location = switch0
202025-03-07T23:11:51.885ZDEBGtest_unauthorized (init_with_steps): Running step start_internal_dns
212025-03-07T23:11:51.885ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmp5pQXu1
222025-03-07T23:11:51.952ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
232025-03-07T23:11:51.952ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
242025-03-07T23:11:51.952ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:34167
252025-03-07T23:11:51.952ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:35595 method = GET path = /config versions = all
262025-03-07T23:11:51.952ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:35595 method = PUT path = /config versions = all
272025-03-07T23:11:51.952ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:35595
282025-03-07T23:11:51.952ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:35595
292025-03-07T23:11:51.952ZDEBGtest_unauthorized (init_with_steps): Running step start_external_dns
302025-03-07T23:11:51.952ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmpHqxqd9
312025-03-07T23:11:51.953ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
322025-03-07T23:11:51.954ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
332025-03-07T23:11:51.954ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:45672
342025-03-07T23:11:51.954ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:45425 method = GET path = /config versions = all
352025-03-07T23:11:51.954ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:45425 method = PUT path = /config versions = all
362025-03-07T23:11:51.954ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:45425
372025-03-07T23:11:51.955ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:45425
382025-03-07T23:11:51.955ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_internal
392025-03-07T23:11:51.955ZDEBGtest_unauthorized: Starting Nexus (internal API)
402025-03-07T23:11:51.955ZINFOtest_unauthorized: setting up nexus server
412025-03-07T23:11:51.955ZINFOtest_unauthorized (ServerContext): registering Oso class class = Action
422025-03-07T23:11:51.955ZINFOtest_unauthorized (ServerContext): registering Oso class class = AnyActor
432025-03-07T23:11:51.956ZINFOtest_unauthorized (ServerContext): registering Oso class class = AuthenticatedActor
442025-03-07T23:11:51.956ZINFOtest_unauthorized (ServerContext): registering Oso class class = BlueprintConfig
452025-03-07T23:11:51.956ZINFOtest_unauthorized (ServerContext): registering Oso class class = Database
462025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = DnsConfig
472025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = Fleet
482025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = Inventory
492025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPoolList
502025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSessionList
512025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequestList
522025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloCertificateList
532025-03-07T23:11:51.957ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloIdentityProviderList
542025-03-07T23:11:51.958ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUserList
552025-03-07T23:11:51.958ZINFOtest_unauthorized (ServerContext): registering Oso class class = TargetReleaseConfig
562025-03-07T23:11:51.958ZINFOtest_unauthorized (ServerContext): registering Oso class class = Project
572025-03-07T23:11:51.959ZINFOtest_unauthorized (ServerContext): registering Oso class class = Disk
582025-03-07T23:11:51.961ZINFOtest_unauthorized (ServerContext): registering Oso class class = Snapshot
592025-03-07T23:11:51.961ZINFOtest_unauthorized (ServerContext): registering Oso class class = ProjectImage
602025-03-07T23:11:51.961ZINFOtest_unauthorized (ServerContext): registering Oso class class = AffinityGroup
612025-03-07T23:11:51.961ZINFOtest_unauthorized (ServerContext): registering Oso class class = AntiAffinityGroup
622025-03-07T23:11:51.961ZINFOtest_unauthorized (ServerContext): registering Oso class class = Instance
632025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPool
642025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = InstanceNetworkInterface
652025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = Vpc
662025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcRouter
672025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGateway
682025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpPool
692025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpAddress
702025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = RouterRoute
712025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcSubnet
722025-03-07T23:11:51.962ZINFOtest_unauthorized (ServerContext): registering Oso class class = FloatingIp
732025-03-07T23:11:51.963ZINFOtest_unauthorized (ServerContext): registering Oso class class = Image
742025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloImage
752025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = AddressLot
762025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = Blueprint
772025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = LoopbackAddress
782025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = Certificate
792025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSession
802025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequest
812025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAccessToken
822025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = PhysicalDisk
832025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = Rack
842025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = RoleBuiltin
852025-03-07T23:11:51.964ZINFOtest_unauthorized (ServerContext): registering Oso class class = SshKey
862025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = Silo
872025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUser
882025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloGroup
892025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = SupportBundle
902025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = IdentityProvider
912025-03-07T23:11:51.967ZINFOtest_unauthorized (ServerContext): registering Oso class class = SamlIdentityProvider
922025-03-07T23:11:51.968ZINFOtest_unauthorized (ServerContext): registering Oso class class = Sled
932025-03-07T23:11:51.968ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufRepo
942025-03-07T23:11:51.968ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufArtifact
952025-03-07T23:11:51.968ZINFOtest_unauthorized (ServerContext): registering Oso class class = Zpool
962025-03-07T23:11:51.968ZINFOtest_unauthorized (ServerContext): registering Oso class class = Service
972025-03-07T23:11:51.970ZINFOtest_unauthorized (ServerContext): registering Oso class class = UserBuiltin
982025-03-07T23:11:51.970ZINFOtest_unauthorized (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
992025-03-07T23:11:51.975ZINFOtest_unauthorized (ServerContext): Setting up resolver using DNS address: [::1]:34167
1002025-03-07T23:11:51.976ZINFOtest_unauthorized (DnsResolver): new DNS resolver addresses = [[::1]:34167]
1012025-03-07T23:11:51.976ZINFOtest_unauthorized (ServerContext): Setting up qorb database pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:34053/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 34053,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
1022025-03-07T23:11:51.976ZDEBGtest_unauthorized (ServerContext): registered USDT probes
1032025-03-07T23:11:52.032ZINFOtest_unauthorized (nexus): Database schema version is up to date desired_version = 130.0.0 found_version = 130.0.0
1042025-03-07T23:11:52.194ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7
1052025-03-07T23:11:52.202ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /bgtasks versions = all
1062025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /bgtasks/activate versions = all
1072025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1082025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /clickhouse/policy versions = all
1092025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /clickhouse/policy versions = all
1102025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1112025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1122025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1132025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1142025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1152025-03-07T23:11:52.203ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /demo-saga versions = all
1162025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1172025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /deployment/blueprints/all versions = all
1182025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1192025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1202025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /deployment/blueprints/import versions = all
1212025-03-07T23:11:52.204ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /deployment/blueprints/regenerate versions = all
1222025-03-07T23:11:52.206ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /deployment/blueprints/target versions = all
1232025-03-07T23:11:52.206ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /deployment/blueprints/target versions = all
1242025-03-07T23:11:52.207ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = PUT path = /deployment/blueprints/target/enabled versions = all
1252025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1262025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = PUT path = /disks/{disk_id} versions = all
1272025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /instances/{instance_id}/migrate versions = all
1282025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /metrics/collectors versions = all
1292025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1302025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /metrics/producers versions = all
1312025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1322025-03-07T23:11:52.208ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /physical-disk/expunge versions = all
1332025-03-07T23:11:52.210ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /probes/{sled} versions = all
1342025-03-07T23:11:52.212ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1352025-03-07T23:11:52.212ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /sagas versions = all
1362025-03-07T23:11:52.212ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /sagas/{saga_id} versions = all
1372025-03-07T23:11:52.213ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /sled-agents/{sled_id} versions = all
1382025-03-07T23:11:52.213ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /sled-agents/{sled_id} versions = all
1392025-03-07T23:11:52.213ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /sled-agents/{sled_id}/firewall-rules-update versions = all
1402025-03-07T23:11:52.213ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /sleds/add versions = all
1412025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /sleds/expunge versions = all
1422025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = GET path = /sleds/uninitialized versions = all
1432025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = PUT path = /switch/{switch_id} versions = all
1442025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = PUT path = /vmms/{propolis_id} versions = all
1452025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:43523 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1462025-03-07T23:11:52.214ZINFOtest_unauthorized (dropshot_internal): listening local_addr = 127.0.0.1:43523
1472025-03-07T23:11:52.214ZDEBGtest_unauthorized (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:43523
1482025-03-07T23:11:52.214ZINFOtest_unauthorized (SEC): SEC running sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
1492025-03-07T23:11:52.214ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1502025-03-07T23:11:52.214ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1512025-03-07T23:11:52.214ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1522025-03-07T23:11:52.214ZDEBGtest_unauthorized (DataLoader): attempting to create built-in users
1532025-03-07T23:11:52.214ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1542025-03-07T23:11:52.214ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1552025-03-07T23:11:52.214ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1562025-03-07T23:11:52.214ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: fd 56 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .V..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:54921 req_id = 4c1d41d9-ce78-4056-ab2f-8c0bb5dbbcd9
1572025-03-07T23:11:52.218ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 64854,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54921 req_id = 4c1d41d9-ce78-4056-ab2f-8c0bb5dbbcd9
1582025-03-07T23:11:52.218ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 64854, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_crucible-pantry._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 16, 95, 99, 114, 117, 99, 105, 98, 108, 101, 45, 112, 97, 110, 116, 114, 121, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:54921 req_id = 4c1d41d9-ce78-4056-ab2f-8c0bb5dbbcd9
1592025-03-07T23:11:52.247ZINFOtest_unauthorized (DataLoader): created 5 built-in users
1602025-03-07T23:11:52.247ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1612025-03-07T23:11:52.247ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1622025-03-07T23:11:52.250ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1632025-03-07T23:11:52.252ZDEBGtest_unauthorized (DataLoader): attempting to create built-in roles
1642025-03-07T23:11:52.252ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1652025-03-07T23:11:52.252ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1662025-03-07T23:11:52.252ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1672025-03-07T23:11:52.289ZINFOtest_unauthorized (DataLoader): created 10 built-in roles
1682025-03-07T23:11:52.289ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1692025-03-07T23:11:52.289ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1702025-03-07T23:11:52.292ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1712025-03-07T23:11:52.292ZDEBGtest_unauthorized (DataLoader): attempting to create built-in role assignments
1722025-03-07T23:11:52.292ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1732025-03-07T23:11:52.292ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1742025-03-07T23:11:52.292ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1752025-03-07T23:11:52.971ZINFOtest_unauthorized (DataLoader): created 4 built-in role assignments
1762025-03-07T23:11:52.972ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1772025-03-07T23:11:52.972ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1782025-03-07T23:11:52.974ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1792025-03-07T23:11:52.974ZDEBGtest_unauthorized (DataLoader): attempting to create built-in silos
1802025-03-07T23:11:52.974ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1812025-03-07T23:11:52.974ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1822025-03-07T23:11:52.975ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1832025-03-07T23:11:53.119ZINFOtest_unauthorized (DataLoader): created 2 built-in silos
1842025-03-07T23:11:53.119ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1852025-03-07T23:11:53.119ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1862025-03-07T23:11:53.119ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1872025-03-07T23:11:53.153ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1882025-03-07T23:11:53.154ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1892025-03-07T23:11:53.157ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1902025-03-07T23:11:53.158ZDEBGtest_unauthorized (DataLoader): attempting to create built-in projects
1912025-03-07T23:11:53.158ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1922025-03-07T23:11:53.158ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1932025-03-07T23:11:53.159ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1942025-03-07T23:11:53.162ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
1952025-03-07T23:11:53.163ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
1962025-03-07T23:11:53.163ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1972025-03-07T23:11:53.163ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1982025-03-07T23:11:53.163ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1992025-03-07T23:11:53.214ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2002025-03-07T23:11:53.214ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2012025-03-07T23:11:53.214ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2022025-03-07T23:11:53.215ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2032025-03-07T23:11:53.217ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2042025-03-07T23:11:53.220ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2052025-03-07T23:11:53.220ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2062025-03-07T23:11:53.220ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2072025-03-07T23:11:53.220ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2082025-03-07T23:11:53.220ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2092025-03-07T23:11:53.221ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2102025-03-07T23:11:53.222ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2112025-03-07T23:11:53.222ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2122025-03-07T23:11:53.222ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2132025-03-07T23:11:53.223ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2142025-03-07T23:11:53.224ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2152025-03-07T23:11:53.227ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2162025-03-07T23:11:53.227ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2172025-03-07T23:11:53.227ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2182025-03-07T23:11:53.229ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2192025-03-07T23:11:53.303ZINFOtest_unauthorized (DataLoader): created built-in services project
2202025-03-07T23:11:53.303ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2212025-03-07T23:11:53.303ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2222025-03-07T23:11:53.305ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2232025-03-07T23:11:53.306ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPCs
2242025-03-07T23:11:53.306ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2252025-03-07T23:11:53.306ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2262025-03-07T23:11:53.307ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2272025-03-07T23:11:53.329ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2282025-03-07T23:11:53.330ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2292025-03-07T23:11:53.331ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2302025-03-07T23:11:53.332ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2312025-03-07T23:11:53.333ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2322025-03-07T23:11:53.333ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2332025-03-07T23:11:53.333ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2342025-03-07T23:11:53.333ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2352025-03-07T23:11:53.334ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2362025-03-07T23:11:53.334ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2372025-03-07T23:11:53.334ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2382025-03-07T23:11:53.334ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2392025-03-07T23:11:53.336ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2402025-03-07T23:11:53.336ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2412025-03-07T23:11:53.336ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2422025-03-07T23:11:53.336ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2432025-03-07T23:11:53.338ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2442025-03-07T23:11:53.352ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2452025-03-07T23:11:53.353ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Project" using built-in user
2462025-03-07T23:11:53.353ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2472025-03-07T23:11:53.353ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2482025-03-07T23:11:53.353ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2492025-03-07T23:11:53.353ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2502025-03-07T23:11:53.353ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2512025-03-07T23:11:53.356ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2522025-03-07T23:11:53.366ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2532025-03-07T23:11:53.367ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2542025-03-07T23:11:53.367ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2552025-03-07T23:11:53.370ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2562025-03-07T23:11:53.370ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2572025-03-07T23:11:53.370ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2582025-03-07T23:11:53.371ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2592025-03-07T23:11:53.374ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2602025-03-07T23:11:53.383ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2612025-03-07T23:11:53.384ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2622025-03-07T23:11:53.384ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2632025-03-07T23:11:53.384ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2642025-03-07T23:11:53.431ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2652025-03-07T23:11:53.431ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2662025-03-07T23:11:53.431ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2672025-03-07T23:11:53.431ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2682025-03-07T23:11:53.434ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2692025-03-07T23:11:53.436ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2702025-03-07T23:11:53.436ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2712025-03-07T23:11:53.436ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2722025-03-07T23:11:53.436ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2732025-03-07T23:11:53.441ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2742025-03-07T23:11:53.441ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2752025-03-07T23:11:53.441ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2762025-03-07T23:11:53.442ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2772025-03-07T23:11:53.447ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2782025-03-07T23:11:53.454ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2792025-03-07T23:11:53.454ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2802025-03-07T23:11:53.455ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2812025-03-07T23:11:53.456ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2822025-03-07T23:11:53.511ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2832025-03-07T23:11:53.512ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2842025-03-07T23:11:53.512ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2852025-03-07T23:11:53.539ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2862025-03-07T23:11:53.540ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2872025-03-07T23:11:53.540ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2882025-03-07T23:11:53.546ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2892025-03-07T23:11:53.548ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2902025-03-07T23:11:53.548ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2912025-03-07T23:11:53.548ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2922025-03-07T23:11:53.548ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2932025-03-07T23:11:53.548ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2942025-03-07T23:11:53.548ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2952025-03-07T23:11:53.548ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2962025-03-07T23:11:53.550ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2972025-03-07T23:11:53.550ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2982025-03-07T23:11:53.550ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2992025-03-07T23:11:53.552ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3002025-03-07T23:11:53.552ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3012025-03-07T23:11:53.554ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3022025-03-07T23:11:53.559ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3032025-03-07T23:11:53.559ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3042025-03-07T23:11:53.559ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3052025-03-07T23:11:53.560ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3062025-03-07T23:11:53.665ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3072025-03-07T23:11:53.665ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3082025-03-07T23:11:53.665ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3092025-03-07T23:11:53.666ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3102025-03-07T23:11:53.666ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3112025-03-07T23:11:53.667ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3122025-03-07T23:11:53.668ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3132025-03-07T23:11:53.668ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3142025-03-07T23:11:53.668ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3152025-03-07T23:11:53.670ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3162025-03-07T23:11:53.670ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3172025-03-07T23:11:53.670ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3182025-03-07T23:11:53.670ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3192025-03-07T23:11:53.674ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3202025-03-07T23:11:53.681ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3212025-03-07T23:11:53.682ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3222025-03-07T23:11:53.682ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3232025-03-07T23:11:53.683ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3242025-03-07T23:11:53.863ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3252025-03-07T23:11:53.864ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3262025-03-07T23:11:53.864ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3272025-03-07T23:11:53.864ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3282025-03-07T23:11:53.865ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3292025-03-07T23:11:53.867ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3302025-03-07T23:11:53.868ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3312025-03-07T23:11:53.868ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3322025-03-07T23:11:53.868ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3332025-03-07T23:11:53.872ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3342025-03-07T23:11:53.872ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3352025-03-07T23:11:53.872ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3362025-03-07T23:11:53.872ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3372025-03-07T23:11:53.877ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3382025-03-07T23:11:53.887ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3392025-03-07T23:11:53.887ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3402025-03-07T23:11:53.887ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3412025-03-07T23:11:53.888ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3422025-03-07T23:11:53.908ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC firewall rules
3432025-03-07T23:11:53.908ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3442025-03-07T23:11:53.908ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3452025-03-07T23:11:53.908ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3462025-03-07T23:11:53.910ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3472025-03-07T23:11:53.910ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3482025-03-07T23:11:53.912ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3492025-03-07T23:11:53.916ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3502025-03-07T23:11:53.916ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3512025-03-07T23:11:53.916ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3522025-03-07T23:11:53.919ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3532025-03-07T23:11:53.921ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3542025-03-07T23:11:53.921ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3552025-03-07T23:11:53.921ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3562025-03-07T23:11:53.922ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3572025-03-07T23:11:53.929ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3582025-03-07T23:11:53.929ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3592025-03-07T23:11:53.929ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3602025-03-07T23:11:53.929ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3612025-03-07T23:11:53.929ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3622025-03-07T23:11:53.929ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3632025-03-07T23:11:53.929ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3642025-03-07T23:11:53.929ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3652025-03-07T23:11:53.929ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3662025-03-07T23:11:53.935ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3672025-03-07T23:11:53.935ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
3682025-03-07T23:11:53.935ZTRACtest_unauthorized (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3692025-03-07T23:11:53.936ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3702025-03-07T23:11:53.936ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3712025-03-07T23:11:53.936ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3722025-03-07T23:11:53.937ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3732025-03-07T23:11:53.939ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3742025-03-07T23:11:53.939ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3752025-03-07T23:11:53.939ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3762025-03-07T23:11:53.940ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3772025-03-07T23:11:53.943ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3782025-03-07T23:11:53.943ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3792025-03-07T23:11:53.944ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3802025-03-07T23:11:53.944ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3812025-03-07T23:11:53.946ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3822025-03-07T23:11:53.960ZDEBGtest_unauthorized (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3832025-03-07T23:11:53.961ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3842025-03-07T23:11:53.961ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3852025-03-07T23:11:53.961ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3862025-03-07T23:11:54.002ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3872025-03-07T23:11:54.003ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3882025-03-07T23:11:54.003ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3892025-03-07T23:11:54.003ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3902025-03-07T23:11:54.005ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3912025-03-07T23:11:54.008ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3922025-03-07T23:11:54.008ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3932025-03-07T23:11:54.008ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3942025-03-07T23:11:54.010ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3952025-03-07T23:11:54.012ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3962025-03-07T23:11:54.014ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3972025-03-07T23:11:54.014ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3982025-03-07T23:11:54.014ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3992025-03-07T23:11:54.019ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4002025-03-07T23:11:54.031ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4012025-03-07T23:11:54.031ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4022025-03-07T23:11:54.031ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4032025-03-07T23:11:54.032ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4042025-03-07T23:11:54.144ZINFOtest_unauthorized (DataLoader): created built-in VPC firewall rules
4052025-03-07T23:11:54.144ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC Subnets
4062025-03-07T23:11:54.144ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4072025-03-07T23:11:54.144ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4082025-03-07T23:11:54.144ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4092025-03-07T23:11:54.159ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4102025-03-07T23:11:54.160ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4112025-03-07T23:11:54.160ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4122025-03-07T23:11:54.162ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4132025-03-07T23:11:54.162ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4142025-03-07T23:11:54.162ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4152025-03-07T23:11:54.165ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4162025-03-07T23:11:54.166ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4172025-03-07T23:11:54.166ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4182025-03-07T23:11:54.166ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4192025-03-07T23:11:54.166ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4202025-03-07T23:11:54.166ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4212025-03-07T23:11:54.167ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4222025-03-07T23:11:54.167ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4232025-03-07T23:11:54.168ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4242025-03-07T23:11:54.175ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4252025-03-07T23:11:54.176ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4262025-03-07T23:11:54.176ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4272025-03-07T23:11:54.178ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4282025-03-07T23:11:54.182ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4292025-03-07T23:11:54.195ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4302025-03-07T23:11:54.196ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4312025-03-07T23:11:54.196ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4322025-03-07T23:11:54.196ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4332025-03-07T23:11:54.197ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4342025-03-07T23:11:54.224ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4352025-03-07T23:11:54.224ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4362025-03-07T23:11:54.224ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4372025-03-07T23:11:54.224ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4382025-03-07T23:11:54.224ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4392025-03-07T23:11:54.230ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4402025-03-07T23:11:54.230ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4412025-03-07T23:11:54.230ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4422025-03-07T23:11:54.230ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4432025-03-07T23:11:54.232ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4442025-03-07T23:11:54.232ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4452025-03-07T23:11:54.232ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4462025-03-07T23:11:54.232ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4472025-03-07T23:11:54.235ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4482025-03-07T23:11:54.242ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4492025-03-07T23:11:54.252ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4502025-03-07T23:11:54.252ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4512025-03-07T23:11:54.252ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4522025-03-07T23:11:54.252ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4532025-03-07T23:11:54.252ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4542025-03-07T23:11:54.257ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4552025-03-07T23:11:54.257ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4562025-03-07T23:11:54.257ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4572025-03-07T23:11:54.258ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4582025-03-07T23:11:54.260ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4592025-03-07T23:11:54.260ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4602025-03-07T23:11:54.260ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4612025-03-07T23:11:54.261ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4622025-03-07T23:11:54.264ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4632025-03-07T23:11:54.276ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4642025-03-07T23:11:54.276ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4652025-03-07T23:11:54.276ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4662025-03-07T23:11:54.277ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4672025-03-07T23:11:54.378ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4682025-03-07T23:11:54.378ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4692025-03-07T23:11:54.378ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4702025-03-07T23:11:54.380ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4712025-03-07T23:11:54.381ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4722025-03-07T23:11:54.381ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4732025-03-07T23:11:54.381ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4742025-03-07T23:11:54.381ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4752025-03-07T23:11:54.387ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4762025-03-07T23:11:54.398ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4772025-03-07T23:11:54.398ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4782025-03-07T23:11:54.399ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4792025-03-07T23:11:54.400ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4802025-03-07T23:11:54.401ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4812025-03-07T23:11:54.401ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4822025-03-07T23:11:54.401ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4832025-03-07T23:11:54.403ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4842025-03-07T23:11:54.410ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4852025-03-07T23:11:54.418ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4862025-03-07T23:11:54.443ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4872025-03-07T23:11:54.444ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4882025-03-07T23:11:54.444ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4892025-03-07T23:11:54.444ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4902025-03-07T23:11:54.446ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4912025-03-07T23:11:54.447ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4922025-03-07T23:11:54.447ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4932025-03-07T23:11:54.447ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4942025-03-07T23:11:54.449ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4952025-03-07T23:11:54.450ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4962025-03-07T23:11:54.450ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4972025-03-07T23:11:54.450ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4982025-03-07T23:11:54.461ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4992025-03-07T23:11:54.479ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5002025-03-07T23:11:54.482ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5012025-03-07T23:11:54.482ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5022025-03-07T23:11:54.482ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5032025-03-07T23:11:54.503ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5042025-03-07T23:11:54.503ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5052025-03-07T23:11:54.504ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5062025-03-07T23:11:54.506ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5072025-03-07T23:11:54.506ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5082025-03-07T23:11:54.507ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5092025-03-07T23:11:54.507ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5102025-03-07T23:11:54.507ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5112025-03-07T23:11:54.509ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5122025-03-07T23:11:54.509ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5132025-03-07T23:11:54.509ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5142025-03-07T23:11:54.509ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5152025-03-07T23:11:54.511ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5162025-03-07T23:11:54.511ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5172025-03-07T23:11:54.511ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5182025-03-07T23:11:54.512ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5192025-03-07T23:11:54.516ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5202025-03-07T23:11:54.521ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5212025-03-07T23:11:54.531ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5222025-03-07T23:11:54.532ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5232025-03-07T23:11:54.532ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5242025-03-07T23:11:54.533ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5252025-03-07T23:11:54.533ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5262025-03-07T23:11:54.536ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5272025-03-07T23:11:54.536ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5282025-03-07T23:11:54.536ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5292025-03-07T23:11:54.537ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5302025-03-07T23:11:54.538ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5312025-03-07T23:11:54.538ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5322025-03-07T23:11:54.539ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5332025-03-07T23:11:54.540ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5342025-03-07T23:11:54.543ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5352025-03-07T23:11:54.564ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5362025-03-07T23:11:54.564ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5372025-03-07T23:11:54.564ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5382025-03-07T23:11:54.565ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5392025-03-07T23:11:54.583ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5402025-03-07T23:11:54.585ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5412025-03-07T23:11:54.586ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5422025-03-07T23:11:54.598ZINFOtest_unauthorized (DataLoader): created built-in services vpc subnets
5432025-03-07T23:11:54.598ZINFOtest_unauthorized (DataLoader): created built-in services vpc
5442025-03-07T23:11:54.598ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5452025-03-07T23:11:54.598ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5462025-03-07T23:11:54.601ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5472025-03-07T23:11:54.601ZDEBGtest_unauthorized (DataLoader): attempting to create silo users
5482025-03-07T23:11:54.601ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5492025-03-07T23:11:54.601ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5502025-03-07T23:11:54.602ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5512025-03-07T23:11:54.649ZINFOtest_unauthorized (DataLoader): created 2 silo users
5522025-03-07T23:11:54.649ZDEBGtest_unauthorized (DataLoader): attempting to create silo user role assignments
5532025-03-07T23:11:54.649ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5542025-03-07T23:11:54.649ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5552025-03-07T23:11:54.650ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5562025-03-07T23:11:54.659ZINFOtest_unauthorized (DataLoader): created 2 silo user role assignments
5572025-03-07T23:11:54.659ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5582025-03-07T23:11:54.660ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5592025-03-07T23:11:54.663ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5602025-03-07T23:11:54.673ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5612025-03-07T23:11:54.673ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5622025-03-07T23:11:54.673ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5632025-03-07T23:11:54.755ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5642025-03-07T23:11:54.755ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5652025-03-07T23:11:54.755ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5662025-03-07T23:11:54.755ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5672025-03-07T23:11:54.755ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5682025-03-07T23:11:54.761ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5692025-03-07T23:11:54.762ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5702025-03-07T23:11:54.762ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5712025-03-07T23:11:54.762ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5722025-03-07T23:11:54.762ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5732025-03-07T23:11:54.801ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5742025-03-07T23:11:54.802ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5752025-03-07T23:11:54.802ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5762025-03-07T23:11:54.802ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5772025-03-07T23:11:54.802ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5782025-03-07T23:11:54.826ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5792025-03-07T23:11:54.830ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5802025-03-07T23:11:54.837ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5812025-03-07T23:11:54.837ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5822025-03-07T23:11:54.838ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5832025-03-07T23:11:55.052ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5842025-03-07T23:11:55.053ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5852025-03-07T23:11:55.053ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5862025-03-07T23:11:55.061ZINFOtest_unauthorized (nexus): populate complete
5872025-03-07T23:11:55.061ZINFOtest_unauthorized (nexus): activating background tasks
5882025-03-07T23:11:55.067ZDEBGtest_unauthorized (init_with_steps): Running step start_sled1
5892025-03-07T23:11:55.067ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5902025-03-07T23:11:55.160ZINFOtest_unauthorized (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5912025-03-07T23:11:55.162ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
5922025-03-07T23:11:55.289ZDEBGtest_unauthorized (dropshot (Repo Depot)): registered endpoint local_addr = [::1]:35509 method = GET path = /artifact/sha256/{sha256} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5932025-03-07T23:11:55.289ZINFOtest_unauthorized (dropshot (Repo Depot)): listening local_addr = [::1]:35509 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5942025-03-07T23:11:55.290ZDEBGtest_unauthorized (dropshot (Repo Depot)): successfully registered DTrace USDT probes local_addr = [::1]:35509 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5952025-03-07T23:11:55.294ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /artifacts sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5962025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5972025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5982025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /artifacts/{sha256}/copy-from-depot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5992025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6002025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6012025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6022025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6032025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /cockroachdb sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6042025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6052025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6062025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6072025-03-07T23:11:55.297ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6082025-03-07T23:11:55.298ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6092025-03-07T23:11:55.298ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6102025-03-07T23:11:55.298ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6112025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6122025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6132025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6142025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6152025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6162025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6172025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6182025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/dladm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6192025-03-07T23:11:55.299ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/ipadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6202025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/pargs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6212025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/pfiles-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6222025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/pstack-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6232025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support/zoneadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6242025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support-bundles/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6252025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6262025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6272025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6282025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6292025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6302025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6312025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6322025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6332025-03-07T23:11:55.300ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6342025-03-07T23:11:55.301ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /timesync sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6352025-03-07T23:11:55.301ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6362025-03-07T23:11:55.301ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6372025-03-07T23:11:55.302ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6382025-03-07T23:11:55.302ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6392025-03-07T23:11:55.302ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6402025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6412025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6422025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6432025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6442025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6452025-03-07T23:11:55.303ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6462025-03-07T23:11:55.304ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6472025-03-07T23:11:55.304ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6482025-03-07T23:11:55.304ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6492025-03-07T23:11:55.304ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6502025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6512025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6522025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6532025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6542025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6552025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6562025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6572025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6582025-03-07T23:11:55.305ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = POST path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6592025-03-07T23:11:55.306ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6602025-03-07T23:11:55.306ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6612025-03-07T23:11:55.306ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:41065 method = GET path = /zpools sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6622025-03-07T23:11:55.307ZINFOtest_unauthorized (dropshot): listening local_addr = [::1]:41065 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6632025-03-07T23:11:55.307ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:41065 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6642025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6652025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6662025-03-07T23:11:55.307ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
6672025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6682025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6692025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6702025-03-07T23:11:55.307ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6712025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6722025-03-07T23:11:55.307ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6732025-03-07T23:11:55.307ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 50.821\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6742025-03-07T23:11:55.307ZDEBGtest_unauthorized (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6752025-03-07T23:11:55.308ZDEBGtest_unauthorized (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:43523/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
6762025-03-07T23:11:55.308ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38984
6772025-03-07T23:11:55.309ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6782025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6792025-03-07T23:11:55.310ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
6802025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6812025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6822025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6832025-03-07T23:11:55.310ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6842025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6852025-03-07T23:11:55.310ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6862025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 26.541\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6872025-03-07T23:11:55.310ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
6882025-03-07T23:11:55.310ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2025-03-07 23:01:55.298670520 UTC
6892025-03-07T23:11:55.311ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
6902025-03-07T23:11:55.311ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
6912025-03-07T23:11:55.311ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6922025-03-07T23:11:55.311ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
6932025-03-07T23:11:55.311ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
6942025-03-07T23:11:55.314ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6952025-03-07T23:11:55.314ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
6962025-03-07T23:11:55.314ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6972025-03-07T23:11:55.314ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
6982025-03-07T23:11:55.315ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 1 reason = Timeout
6992025-03-07T23:11:55.315ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
7002025-03-07T23:11:55.315ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
7012025-03-07T23:11:55.315ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
7022025-03-07T23:11:55.315ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
7032025-03-07T23:11:55.315ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
7042025-03-07T23:11:55.315ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
7052025-03-07T23:11:55.316ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
7062025-03-07T23:11:55.316ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
7072025-03-07T23:11:55.316ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
7082025-03-07T23:11:55.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig
7092025-03-07T23:11:55.322ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7102025-03-07T23:11:55.323ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
7112025-03-07T23:11:55.323ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7122025-03-07T23:11:55.323ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
7132025-03-07T23:11:55.323ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
7142025-03-07T23:11:55.324ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
7152025-03-07T23:11:55.325ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 28.39\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7162025-03-07T23:11:55.327ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7172025-03-07T23:11:55.327ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7182025-03-07T23:11:55.327ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 11.99\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7192025-03-07T23:11:55.327ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
7202025-03-07T23:11:55.327ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
7212025-03-07T23:11:55.327ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7222025-03-07T23:11:55.327ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
7232025-03-07T23:11:55.327ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7242025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
7252025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
7262025-03-07T23:11:55.328ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
7272025-03-07T23:11:55.328ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7282025-03-07T23:11:55.328ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
7292025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
7302025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
7312025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
7322025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 26.061\u{b5}s iteration = 1 status = {"error":"task disabled"}
7332025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
7342025-03-07T23:11:55.328ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
7352025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 13.98\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7362025-03-07T23:11:55.328ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7372025-03-07T23:11:55.328ZINFOtest_unauthorized (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7382025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 29.921\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7392025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7402025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
7412025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7422025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
7432025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
7442025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
7452025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7462025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
7472025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7482025-03-07T23:11:55.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
7492025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7502025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7512025-03-07T23:11:55.329ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7522025-03-07T23:11:55.330ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
7532025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7542025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
7552025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7562025-03-07T23:11:55.330ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
7572025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7582025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
7592025-03-07T23:11:55.330ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7602025-03-07T23:11:55.330ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
7612025-03-07T23:11:55.331ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7622025-03-07T23:11:55.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7632025-03-07T23:11:55.331ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7642025-03-07T23:11:55.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
7652025-03-07T23:11:55.331ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7662025-03-07T23:11:55.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
7672025-03-07T23:11:55.331ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7682025-03-07T23:11:55.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
7692025-03-07T23:11:55.332ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7702025-03-07T23:11:55.335ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7712025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 86.223\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7722025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7732025-03-07T23:11:55.336ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
7742025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7752025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7762025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7772025-03-07T23:11:55.336ZDEBGtest_unauthorized (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7782025-03-07T23:11:55.336ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
7792025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7802025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7812025-03-07T23:11:55.336ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7822025-03-07T23:11:55.336ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7832025-03-07T23:11:55.337ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
7842025-03-07T23:11:55.337ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7852025-03-07T23:11:55.337ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
7862025-03-07T23:11:55.337ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7872025-03-07T23:11:55.337ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7882025-03-07T23:11:55.337ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7892025-03-07T23:11:55.339ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
7902025-03-07T23:11:55.340ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7912025-03-07T23:11:55.340ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7922025-03-07T23:11:55.340ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7932025-03-07T23:11:55.340ZDEBGtest_unauthorized (SagaRecoverer): listing candidate sagas for recovery
7942025-03-07T23:11:55.340ZTRACtest_unauthorized (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database
7952025-03-07T23:11:55.340ZDEBGtest_unauthorized (SagaRecoverer): roles roles = RoleSet { roles: {} }
7962025-03-07T23:11:55.340ZDEBGtest_unauthorized (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database result = Ok(())
7972025-03-07T23:11:55.341ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7982025-03-07T23:11:55.341ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
7992025-03-07T23:11:55.341ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
8002025-03-07T23:11:55.341ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
8012025-03-07T23:11:55.341ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
8022025-03-07T23:11:55.342ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
8032025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
8042025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
8052025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
8062025-03-07T23:11:55.342ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
8072025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
8082025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
8092025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
8102025-03-07T23:11:55.342ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
8112025-03-07T23:11:55.342ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
8122025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
8132025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
8142025-03-07T23:11:55.343ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database
8152025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
8162025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
8172025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
8182025-03-07T23:11:55.343ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
8192025-03-07T23:11:55.343ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8202025-03-07T23:11:55.343ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
8212025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
8222025-03-07T23:11:55.343ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
8232025-03-07T23:11:55.345ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 1 reason = Timeout
8242025-03-07T23:11:55.345ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database
8252025-03-07T23:11:55.345ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
8262025-03-07T23:11:55.345ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
8272025-03-07T23:11:55.345ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
8282025-03-07T23:11:55.345ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8292025-03-07T23:11:55.345ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
8302025-03-07T23:11:55.345ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
8312025-03-07T23:11:55.345ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
8322025-03-07T23:11:55.345ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38984 req_id = fb6e70bf-d518-49a3-8fa7-b0a21c19430f uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
8332025-03-07T23:11:55.346ZINFOtest_unauthorized (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
8342025-03-07T23:11:55.346ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 6d 12 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 m............_na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:56411 req_id = df19fad5-d671-4b88-8050-a3672d269dcc
8352025-03-07T23:11:55.346ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 27922,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56411 req_id = df19fad5-d671-4b88-8050-a3672d269dcc
8362025-03-07T23:11:55.346ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 27922, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56411 req_id = df19fad5-d671-4b88-8050-a3672d269dcc
8372025-03-07T23:11:55.346ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8382025-03-07T23:11:55.346ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8392025-03-07T23:11:55.346ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
8402025-03-07T23:11:55.346ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8412025-03-07T23:11:55.346ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8422025-03-07T23:11:55.346ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8432025-03-07T23:11:55.346ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 44.321808ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8442025-03-07T23:11:55.346ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: cc 09 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:55731 req_id = 7e032224-19e5-4f19-b3bd-ac5fe345b16b
8452025-03-07T23:11:55.361ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 52233,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55731 req_id = 7e032224-19e5-4f19-b3bd-ac5fe345b16b
8462025-03-07T23:11:55.361ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 52233, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:55731 req_id = 7e032224-19e5-4f19-b3bd-ac5fe345b16b
8472025-03-07T23:11:55.361ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8482025-03-07T23:11:55.361ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 46.499905ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8492025-03-07T23:11:55.363ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8502025-03-07T23:11:55.364ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: b1 a5 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:51668 req_id = a6c82589-3b23-42b2-a178-8a64a7837b0b
8512025-03-07T23:11:55.366ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 45477,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51668 req_id = a6c82589-3b23-42b2-a178-8a64a7837b0b
8522025-03-07T23:11:55.367ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 45477, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:51668 req_id = a6c82589-3b23-42b2-a178-8a64a7837b0b
8532025-03-07T23:11:55.367ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_v4_garbage_collector error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8542025-03-07T23:11:55.367ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = nat_v4_garbage_collector elapsed = 64.710222ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8552025-03-07T23:11:55.409ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2025-03-07 23:01:55.298670520 UTC pruned = {}
8562025-03-07T23:11:55.409ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 79.409465ms iteration = 1 status = {"expiration":"2025-03-07T23:01:55.298670520Z","pruned":[]}
8572025-03-07T23:11:55.409ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8582025-03-07T23:11:55.409ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: d4 8d 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:65502 req_id = 0ebf14f2-ff27-4255-9519-f7f2c48600c5
8592025-03-07T23:11:55.409ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54413,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65502 req_id = 0ebf14f2-ff27-4255-9519-f7f2c48600c5
8602025-03-07T23:11:55.409ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 54413, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:65502 req_id = 0ebf14f2-ff27-4255-9519-f7f2c48600c5
8612025-03-07T23:11:55.409ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8622025-03-07T23:11:55.409ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 107.627524ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8632025-03-07T23:11:55.518ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
8642025-03-07T23:11:55.518ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8652025-03-07T23:11:55.518ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
8662025-03-07T23:11:55.555ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8672025-03-07T23:11:55.558ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8682025-03-07T23:11:55.558ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
8692025-03-07T23:11:55.558ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8702025-03-07T23:11:55.559ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
8712025-03-07T23:11:55.587ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 280.367038ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8722025-03-07T23:11:55.587ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
8732025-03-07T23:11:55.587ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
8742025-03-07T23:11:55.587ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
8752025-03-07T23:11:55.587ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
8762025-03-07T23:11:55.599ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8772025-03-07T23:11:55.600ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
8782025-03-07T23:11:55.600ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8792025-03-07T23:11:55.600ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8802025-03-07T23:11:55.601ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8812025-03-07T23:11:55.654ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8822025-03-07T23:11:55.666ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
8832025-03-07T23:11:55.667ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
8842025-03-07T23:11:55.667ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
8852025-03-07T23:11:55.668ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
8862025-03-07T23:11:55.669ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8872025-03-07T23:11:55.678ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
8882025-03-07T23:11:55.681ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
8892025-03-07T23:11:55.681ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
8902025-03-07T23:11:55.681ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
8912025-03-07T23:11:55.702ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8922025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
8932025-03-07T23:11:55.719ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
8942025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
8952025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
8962025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8972025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8982025-03-07T23:11:55.719ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
8992025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
9002025-03-07T23:11:55.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
9012025-03-07T23:11:55.735ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 424.359481ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
9022025-03-07T23:11:55.756ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
9032025-03-07T23:11:55.756ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
9042025-03-07T23:11:55.756ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
9052025-03-07T23:11:55.763ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9062025-03-07T23:11:55.768ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
9072025-03-07T23:11:55.768ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
9082025-03-07T23:11:55.768ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
9092025-03-07T23:11:55.769ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
9102025-03-07T23:11:55.769ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9112025-03-07T23:11:55.792ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9122025-03-07T23:11:55.793ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
9132025-03-07T23:11:55.793ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9142025-03-07T23:11:55.793ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
9152025-03-07T23:11:55.793ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9162025-03-07T23:11:55.800ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9172025-03-07T23:11:55.801ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9182025-03-07T23:11:55.813ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9192025-03-07T23:11:55.815ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
9202025-03-07T23:11:55.815ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9212025-03-07T23:11:55.815ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9222025-03-07T23:11:55.815ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9232025-03-07T23:11:55.816ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9242025-03-07T23:11:55.862ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9252025-03-07T23:11:55.869ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
9262025-03-07T23:11:55.951ZINFOtest_unauthorized (SagaRecoverer): listed in-progress sagas count = 0
9272025-03-07T23:11:55.955ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 644.851704ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
9282025-03-07T23:11:55.955ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9292025-03-07T23:11:55.955ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9302025-03-07T23:11:55.957ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9312025-03-07T23:11:55.959ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 647.241317ms iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
9322025-03-07T23:11:55.998ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 684.709256ms iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
9332025-03-07T23:11:56.005ZDEBGtest_unauthorized (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
9342025-03-07T23:11:56.005ZINFOtest_unauthorized (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
9352025-03-07T23:11:56.005ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 695.913289ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
9362025-03-07T23:11:56.006ZWARNtest_unauthorized (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
9372025-03-07T23:11:56.006ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 704.478733ms iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
9382025-03-07T23:11:56.007ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
9392025-03-07T23:11:56.007ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
9402025-03-07T23:11:56.008ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
9412025-03-07T23:11:56.008ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9422025-03-07T23:11:56.021ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
9432025-03-07T23:11:56.024ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
9442025-03-07T23:11:56.026ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9452025-03-07T23:11:56.026ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9462025-03-07T23:11:56.026ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9472025-03-07T23:11:56.026ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9482025-03-07T23:11:56.026ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
9492025-03-07T23:11:56.027ZWARNtest_unauthorized (BackgroundTasks): instance reincarnation completed with errors background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0 query_errors = 0 restart_errors = 0
9502025-03-07T23:11:56.027ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 719.496355ms iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
9512025-03-07T23:11:56.057ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 752.779715ms iteration = 1 status = {}
9522025-03-07T23:11:56.057ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9532025-03-07T23:11:56.065ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9542025-03-07T23:11:56.065ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
9552025-03-07T23:11:56.066ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9562025-03-07T23:11:56.066ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9572025-03-07T23:11:56.095ZWARNtest_unauthorized (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
9582025-03-07T23:11:56.095ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 791.841115ms iteration = 1 status = {"error":"inventory collection is None"}
9592025-03-07T23:11:56.107ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
9602025-03-07T23:11:56.107ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
9612025-03-07T23:11:56.108ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
9622025-03-07T23:11:56.115ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 799.702361ms iteration = 1 status = {"errors":[],"requests_created_ok":[]}
9632025-03-07T23:11:56.115ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
9642025-03-07T23:11:56.115ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
9652025-03-07T23:11:56.116ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
9662025-03-07T23:11:56.116ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
9672025-03-07T23:11:56.116ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
9682025-03-07T23:11:56.117ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: a3 03 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:62311 req_id = 22eaa607-7c2c-4b1d-a120-131ef2567bbb
9692025-03-07T23:11:56.117ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 41731,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62311 req_id = 22eaa607-7c2c-4b1d-a120-131ef2567bbb
9702025-03-07T23:11:56.118ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 41731, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:62311 req_id = 22eaa607-7c2c-4b1d-a120-131ef2567bbb
9712025-03-07T23:11:56.118ZWARNtest_unauthorized (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9722025-03-07T23:11:56.118ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 816.435648ms iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9732025-03-07T23:11:56.128ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
9742025-03-07T23:11:56.133ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 821.934962ms iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
9752025-03-07T23:11:56.134ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
9762025-03-07T23:11:56.134ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
9772025-03-07T23:11:56.134ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9782025-03-07T23:11:56.134ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9792025-03-07T23:11:56.134ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9802025-03-07T23:11:56.134ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
9812025-03-07T23:11:56.134ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
9822025-03-07T23:11:56.134ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
9832025-03-07T23:11:56.139ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9842025-03-07T23:11:56.144ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
9852025-03-07T23:11:56.144ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9862025-03-07T23:11:56.145ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9872025-03-07T23:11:56.145ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9882025-03-07T23:11:56.150ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
9892025-03-07T23:11:56.151ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 853.315413ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
9902025-03-07T23:11:56.190ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
9912025-03-07T23:11:56.193ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9922025-03-07T23:11:56.193ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9932025-03-07T23:11:56.193ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9942025-03-07T23:11:56.217ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 910.803105ms iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
9952025-03-07T23:11:56.218ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
9962025-03-07T23:11:56.218ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 923.435374ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
9972025-03-07T23:11:56.219ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9982025-03-07T23:11:56.219ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9992025-03-07T23:11:56.219ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10002025-03-07T23:11:56.220ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10012025-03-07T23:11:56.228ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10022025-03-07T23:11:56.235ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
10032025-03-07T23:11:56.235ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
10042025-03-07T23:11:56.235ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
10052025-03-07T23:11:56.235ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
10062025-03-07T23:11:56.236ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10072025-03-07T23:11:56.236ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10082025-03-07T23:11:56.236ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10092025-03-07T23:11:56.241ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
10102025-03-07T23:11:56.242ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10112025-03-07T23:11:56.242ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10122025-03-07T23:11:56.242ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10132025-03-07T23:11:56.243ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10142025-03-07T23:11:56.243ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10152025-03-07T23:11:56.243ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10162025-03-07T23:11:56.249ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10172025-03-07T23:11:56.250ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10182025-03-07T23:11:56.259ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
10192025-03-07T23:11:56.260ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10202025-03-07T23:11:56.260ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10212025-03-07T23:11:56.260ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10222025-03-07T23:11:56.303ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10232025-03-07T23:11:56.305ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
10242025-03-07T23:11:56.306ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
10252025-03-07T23:11:56.306ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
10262025-03-07T23:11:56.308ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
10272025-03-07T23:11:56.320ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
10282025-03-07T23:11:56.320ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10292025-03-07T23:11:56.320ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10302025-03-07T23:11:56.320ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10312025-03-07T23:11:56.321ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10322025-03-07T23:11:56.322ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
10332025-03-07T23:11:56.322ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
10342025-03-07T23:11:56.322ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10352025-03-07T23:11:56.322ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10362025-03-07T23:11:56.322ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10372025-03-07T23:11:56.323ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10382025-03-07T23:11:56.326ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 989839 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38984 req_id = fb6e70bf-d518-49a3-8fa7-b0a21c19430f response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10392025-03-07T23:11:56.326ZDEBGtest_unauthorized (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:43523/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "fb6e70bf-d518-49a3-8fa7-b0a21c19430f", "date": "Fri, 07 Mar 2025 23:11:55 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10402025-03-07T23:11:56.326ZDEBGtest_unauthorized (init_with_steps): Running step start_crucible_pantry
10412025-03-07T23:11:56.326ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10422025-03-07T23:11:56.326ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10432025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10442025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10452025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10462025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10472025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10482025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10492025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10502025-03-07T23:11:56.328ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10512025-03-07T23:11:56.329ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:39045 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10522025-03-07T23:11:56.329ZINFOtest_unauthorized (dropshot): listening kind = pantry local_addr = [::1]:39045 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10532025-03-07T23:11:56.329ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:39045 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10542025-03-07T23:11:56.329ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:39045 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10552025-03-07T23:11:56.329ZDEBGtest_unauthorized (init_with_steps): Running step populate_internal_dns
10562025-03-07T23:11:56.329ZDEBGtest_unauthorized: Populating Internal DNS
10572025-03-07T23:11:56.386ZINFOtest_unauthorized: DNS population: DnsConfigParams { generation: Generation( 1, ), time_created: 2025-03-07T23:11:56.386398539Z, zones: [ DnsConfigZone { zone_name: "control-plane.oxide.internal", records: { "_mgs._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 42897, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_clickhouse._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 43011, target: "270cf680-3c03-44b1-acd0-0f4eca3a71e5.host.control-plane.oxide.internal", }, ), ], "1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host": [ Aaaa( ::1, ), ], "cedd38c4-2f15-4a76-91e3-9d4bc49191a8.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "_clickhouse-native._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "270cf680-3c03-44b1-acd0-0f4eca3a71e5.host.control-plane.oxide.internal", }, ), ], "_nameservice._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 35595, target: "28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal", }, ), ], "_cockroach._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 34053, target: "66d87931-8b61-4a8c-be7c-24f181efbe6e.host.control-plane.oxide.internal", }, ), ], "_external-dns._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 45425, target: "1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal", }, ), ], "_nexus._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 43523, target: "cedd38c4-2f15-4a76-91e3-9d4bc49191a8.host.control-plane.oxide.internal", }, ), ], "66d87931-8b61-4a8c-be7c-24f181efbe6e.host": [ Aaaa( ::1, ), ], "0e6bb5a8-575d-49b1-ad69-07a16d95201a.host": [ Aaaa( ::1, ), ], "_mgd._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39787, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_crucible-pantry._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39045, target: "0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal", }, ), ], "270cf680-3c03-44b1-acd0-0f4eca3a71e5.host": [ Aaaa( ::1, ), ], "28a47900-2f91-401f-929b-b6803f4d8da7.host": [ Aaaa( ::1, ), ], "_clickhouse-admin-single-server._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 8888, target: "270cf680-3c03-44b1-acd0-0f4eca3a71e5.host.control-plane.oxide.internal", }, ), ], "_dendrite._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 43451, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], }, }, ], }
10582025-03-07T23:11:56.386ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:35595/config
10592025-03-07T23:11:56.387ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10602025-03-07T23:11:56.387ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10612025-03-07T23:11:56.388ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10622025-03-07T23:11:56.389ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement elapsed = 1.083129399s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
10632025-03-07T23:11:56.389ZWARNtest_unauthorized (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
10642025-03-07T23:11:56.389ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 1.089848024s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
10652025-03-07T23:11:56.389ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 1.077424349s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
10662025-03-07T23:11:56.389ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 1.076203588s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
10672025-03-07T23:11:56.389ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
10682025-03-07T23:11:56.389ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10692025-03-07T23:11:56.390ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
10702025-03-07T23:11:56.390ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10712025-03-07T23:11:56.397ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
10722025-03-07T23:11:56.397ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10732025-03-07T23:11:56.397ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10742025-03-07T23:11:56.398ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10752025-03-07T23:11:56.400ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10762025-03-07T23:11:56.406ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
10772025-03-07T23:11:56.406ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10782025-03-07T23:11:56.406ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10792025-03-07T23:11:56.406ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10802025-03-07T23:11:56.407ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10812025-03-07T23:11:56.408ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10822025-03-07T23:11:56.409ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10832025-03-07T23:11:56.409ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:35595 remote_addr = [::1]:51998
10842025-03-07T23:11:56.410ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:35595 method = PUT remote_addr = [::1]:51998 req_id = c34bd9b0-75ee-4a76-873e-c4a69f79ce3e uri = /config
10852025-03-07T23:11:56.411ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = c34bd9b0-75ee-4a76-873e-c4a69f79ce3e
10862025-03-07T23:11:56.411ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
10872025-03-07T23:11:56.411ZDEBGtest_unauthorized (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
10882025-03-07T23:11:56.413ZDEBGtest_unauthorized (store): updating current config
10892025-03-07T23:11:56.421ZDEBGtest_unauthorized (store): flushing default tree
10902025-03-07T23:11:56.426ZINFOtest_unauthorized (store): pruning trees for generations older than 1 keep = 3
10912025-03-07T23:11:56.426ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = c34bd9b0-75ee-4a76-873e-c4a69f79ce3e
10922025-03-07T23:11:56.426ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 16655 local_addr = [::1]:35595 method = PUT remote_addr = [::1]:51998 req_id = c34bd9b0-75ee-4a76-873e-c4a69f79ce3e response_code = 204 uri = /config
10932025-03-07T23:11:56.430ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:35595/config", status: 204, headers: {"x-request-id": "c34bd9b0-75ee-4a76-873e-c4a69f79ce3e", "date": "Fri, 07 Mar 2025 23:11:56 GMT"} })
10942025-03-07T23:11:56.432ZDEBGtest_unauthorized (init_with_steps): Running step configure_sled_agents
10952025-03-07T23:11:56.502ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:41065/omicron-zones
10962025-03-07T23:11:56.572ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
10972025-03-07T23:11:56.572ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10982025-03-07T23:11:56.573ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
10992025-03-07T23:11:56.573ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11002025-03-07T23:11:56.573ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11012025-03-07T23:11:56.575ZINFOtest_unauthorized (BackgroundTasks): No bundles to collect background_task = support_bundle_collector
11022025-03-07T23:11:56.576ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 1.273305579s iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
11032025-03-07T23:11:56.660ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
11042025-03-07T23:11:56.660ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
11052025-03-07T23:11:56.675ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11062025-03-07T23:11:56.675ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11072025-03-07T23:11:56.680ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11082025-03-07T23:11:56.680ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11092025-03-07T23:11:56.682ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11102025-03-07T23:11:56.683ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11112025-03-07T23:11:56.689ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11122025-03-07T23:11:56.689ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
11132025-03-07T23:11:56.689ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11142025-03-07T23:11:56.690ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11152025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
11162025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11172025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11182025-03-07T23:11:56.692ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11192025-03-07T23:11:56.692ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11202025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
11212025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
11222025-03-07T23:11:56.692ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11232025-03-07T23:11:56.692ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11242025-03-07T23:11:56.693ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11252025-03-07T23:11:56.696ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11262025-03-07T23:11:56.701ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
11272025-03-07T23:11:56.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
11282025-03-07T23:11:56.701ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11292025-03-07T23:11:56.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11302025-03-07T23:11:56.702ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11312025-03-07T23:11:56.702ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11322025-03-07T23:11:56.707ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34774 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11332025-03-07T23:11:56.707ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34776 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11342025-03-07T23:11:56.707ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34776 req_id = 130a45b2-edf9-4ae7-8c7d-dfe8f0880aaa sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11352025-03-07T23:11:56.707ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 04 d7 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:63031 req_id = c1f28808-1cba-43b8-b190-13ea6e069afa
11362025-03-07T23:11:56.707ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 1239,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63031 req_id = c1f28808-1cba-43b8-b190-13ea6e069afa
11372025-03-07T23:11:56.707ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
11382025-03-07T23:11:56.707ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11392025-03-07T23:11:56.709ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63031 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = c1f28808-1cba-43b8-b190-13ea6e069afa
11402025-03-07T23:11:56.709ZINFOtest_unauthorized (dropshot): request completed latency_us = 1245 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34776 req_id = 130a45b2-edf9-4ae7-8c7d-dfe8f0880aaa response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11412025-03-07T23:11:56.709ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34774 req_id = 3c67d8d4-5ec7-4fec-8567-7ec83be7b1a2 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
11422025-03-07T23:11:56.709ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2801, tv_nsec: 483864315 } })
11432025-03-07T23:11:56.709ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
11442025-03-07T23:11:56.709ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "130a45b2-edf9-4ae7-8c7d-dfe8f0880aaa", "content-length": "2", "date": "Fri, 07 Mar 2025 23:11:56 GMT"} })
11452025-03-07T23:11:56.709ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
11462025-03-07T23:11:56.709ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
11472025-03-07T23:11:56.709ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
11482025-03-07T23:11:56.709ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11492025-03-07T23:11:56.712ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
11502025-03-07T23:11:56.713ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11512025-03-07T23:11:56.713ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11522025-03-07T23:11:56.713ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11532025-03-07T23:11:56.713ZINFOtest_unauthorized (dropshot): request completed latency_us = 7615 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34774 req_id = 3c67d8d4-5ec7-4fec-8567-7ec83be7b1a2 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
11542025-03-07T23:11:56.715ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:41065/omicron-zones", status: 204, headers: {"x-request-id": "3c67d8d4-5ec7-4fec-8567-7ec83be7b1a2", "date": "Fri, 07 Mar 2025 23:11:56 GMT"} })
11552025-03-07T23:11:56.715ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:41065/network-bootstore-config
11562025-03-07T23:11:56.715ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: ea 5d 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .]..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:50652 req_id = cb232115-3a8c-489e-8aa6-3279baf85016
11572025-03-07T23:11:56.716ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 59997,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50652 req_id = cb232115-3a8c-489e-8aa6-3279baf85016
11582025-03-07T23:11:56.716ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11592025-03-07T23:11:56.716ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:50652 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = cb232115-3a8c-489e-8aa6-3279baf85016
11602025-03-07T23:11:56.716ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34774 req_id = 3537dcc3-cc82-4c47-ac73-755091753930 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
11612025-03-07T23:11:56.800ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
11622025-03-07T23:11:56.800ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication body = None method = GET uri = http://[::1]:41065/artifacts
11632025-03-07T23:11:56.801ZINFOtest_unauthorized (dropshot): request completed latency_us = 85088 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34774 req_id = 3537dcc3-cc82-4c47-ac73-755091753930 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
11642025-03-07T23:11:56.802ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
11652025-03-07T23:11:56.802ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11662025-03-07T23:11:56.802ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11672025-03-07T23:11:56.803ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11682025-03-07T23:11:56.806ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34778 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11692025-03-07T23:11:56.807ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11702025-03-07T23:11:56.807ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11712025-03-07T23:11:56.807ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11722025-03-07T23:11:56.808ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11732025-03-07T23:11:56.811ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:41065/network-bootstore-config", status: 204, headers: {"x-request-id": "3537dcc3-cc82-4c47-ac73-755091753930", "date": "Fri, 07 Mar 2025 23:11:56 GMT"} })
11742025-03-07T23:11:56.812ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_external
11752025-03-07T23:11:56.813ZDEBGtest_unauthorized: Starting Nexus (external API)
11762025-03-07T23:11:57.671ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
11772025-03-07T23:11:57.672ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11782025-03-07T23:11:57.672ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
11792025-03-07T23:11:57.672ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
11802025-03-07T23:11:57.673ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
11812025-03-07T23:11:57.674ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34778 req_id = 54bd312b-5d9b-4bc6-922c-a47796c59fd9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
11822025-03-07T23:11:57.675ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: d4 da 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:58357 req_id = 1f82917e-04cd-40bd-8cad-c84e25c4f63a
11832025-03-07T23:11:57.675ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54490,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58357 req_id = 1f82917e-04cd-40bd-8cad-c84e25c4f63a
11842025-03-07T23:11:57.675ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
11852025-03-07T23:11:57.675ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 54490, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:58357 req_id = 1f82917e-04cd-40bd-8cad-c84e25c4f63a
11862025-03-07T23:11:57.676ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
11872025-03-07T23:11:57.677ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
11882025-03-07T23:11:57.740ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:41065/v2p
11892025-03-07T23:11:57.740ZINFOtest_unauthorized (dropshot): request completed latency_us = 67309 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34778 req_id = 54bd312b-5d9b-4bc6-922c-a47796c59fd9 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
11902025-03-07T23:11:57.741ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11912025-03-07T23:11:57.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11922025-03-07T23:11:57.750ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
11932025-03-07T23:11:57.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11942025-03-07T23:11:57.750ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11952025-03-07T23:11:57.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11962025-03-07T23:11:57.752ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
11972025-03-07T23:11:57.752ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
11982025-03-07T23:11:57.752ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
11992025-03-07T23:11:57.752ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34776 req_id = f834e4ac-961c-410d-aaf0-56da5781764c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
12002025-03-07T23:11:57.752ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34780 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12012025-03-07T23:11:57.753ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication result = Ok(Response { url: "http://[::1]:41065/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "54bd312b-5d9b-4bc6-922c-a47796c59fd9", "content-length": "2", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12022025-03-07T23:11:57.754ZINFOtest_unauthorized (BackgroundTasks): Successfully got artifact list background_task = tuf_artifact_replication sled = http://[::1]:41065
12032025-03-07T23:11:57.754ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = tuf_artifact_replication elapsed = 2.440167118s iteration = 1 status = {"last_run_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2025-03-07T23:11:57.753682615Z"}]}
12042025-03-07T23:11:57.755ZINFOtest_unauthorized (dropshot): request completed latency_us = 3192 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34776 req_id = f834e4ac-961c-410d-aaf0-56da5781764c response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
12052025-03-07T23:11:57.756ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12062025-03-07T23:11:57.759ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
12072025-03-07T23:11:57.760ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12082025-03-07T23:11:57.760ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12092025-03-07T23:11:57.760ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12102025-03-07T23:11:57.760ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34780 req_id = e0ef4624-4029-4216-b77b-1251619568b1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
12112025-03-07T23:11:57.761ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12122025-03-07T23:11:57.762ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12132025-03-07T23:11:57.762ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12142025-03-07T23:11:57.763ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "f834e4ac-961c-410d-aaf0-56da5781764c", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12152025-03-07T23:11:57.765ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 2.455423015s iteration = 1 status = {}
12162025-03-07T23:11:57.765ZINFOtest_unauthorized (dropshot): request completed latency_us = 5199 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34780 req_id = e0ef4624-4029-4216-b77b-1251619568b1 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
12172025-03-07T23:11:57.774ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:41065/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0ef4624-4029-4216-b77b-1251619568b1", "content-length": "2", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12182025-03-07T23:11:57.774ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
12192025-03-07T23:11:57.774ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
12202025-03-07T23:11:57.774ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
12212025-03-07T23:11:57.775ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 2.4709029s iteration = 1 status = {}
12222025-03-07T23:11:57.777ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12232025-03-07T23:11:57.777ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12242025-03-07T23:11:57.778ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12252025-03-07T23:11:57.779ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12262025-03-07T23:11:57.779ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12272025-03-07T23:11:57.780ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12282025-03-07T23:11:57.786ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "045c8503-9f82-493d-ba59-95082e849e75", "content-length": "835", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12292025-03-07T23:11:57.786ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
12302025-03-07T23:11:57.790ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12312025-03-07T23:11:57.790ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12322025-03-07T23:11:57.791ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12332025-03-07T23:11:57.797ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
12342025-03-07T23:11:57.798ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12352025-03-07T23:11:57.798ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12362025-03-07T23:11:57.798ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12372025-03-07T23:11:57.798ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12382025-03-07T23:11:57.806ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12392025-03-07T23:11:57.806ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12402025-03-07T23:11:57.807ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12412025-03-07T23:11:57.808ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12422025-03-07T23:11:57.811ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12432025-03-07T23:11:57.812ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12442025-03-07T23:11:57.812ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12452025-03-07T23:11:57.813ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12462025-03-07T23:11:57.814ZINFOtest_unauthorized (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
12472025-03-07T23:11:57.814ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12482025-03-07T23:11:57.814ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12492025-03-07T23:11:57.814ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12502025-03-07T23:11:57.824ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12512025-03-07T23:11:57.833ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
12522025-03-07T23:11:57.833ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
12532025-03-07T23:11:57.833ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
12542025-03-07T23:11:57.833ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12552025-03-07T23:11:57.833ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12562025-03-07T23:11:57.834ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12572025-03-07T23:11:57.834ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12582025-03-07T23:11:57.835ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5706759b-4e9e-4858-a984-6238559deb1c", "content-length": "734", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12592025-03-07T23:11:57.835ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
12602025-03-07T23:11:57.852ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
12612025-03-07T23:11:57.852ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12622025-03-07T23:11:57.852ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12632025-03-07T23:11:57.852ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12642025-03-07T23:11:57.853ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12652025-03-07T23:11:57.853ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12662025-03-07T23:11:57.854ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12672025-03-07T23:11:57.854ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12682025-03-07T23:11:57.855ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12692025-03-07T23:11:57.858ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12702025-03-07T23:11:57.863ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
12712025-03-07T23:11:57.863ZDEBGtest_unauthorized (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
12722025-03-07T23:11:57.863ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12732025-03-07T23:11:57.863ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12742025-03-07T23:11:57.864ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12752025-03-07T23:11:57.865ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12762025-03-07T23:11:57.865ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12772025-03-07T23:11:57.865ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12782025-03-07T23:11:57.867ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12792025-03-07T23:11:57.869ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12802025-03-07T23:11:57.878ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
12812025-03-07T23:11:57.879ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12822025-03-07T23:11:57.879ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12832025-03-07T23:11:57.880ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12842025-03-07T23:11:57.880ZINFOtest_unauthorized (InternalApi): Using static configuration for external switchports
12852025-03-07T23:11:57.880ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12862025-03-07T23:11:57.881ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12872025-03-07T23:11:57.881ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12882025-03-07T23:11:57.900ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "431f0745-950c-4fc5-a200-14cecb6af0fe", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12892025-03-07T23:11:57.901ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
12902025-03-07T23:11:57.923ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c47d1213-3f8e-45bd-b140-d2d6871a86d5", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
12912025-03-07T23:11:57.923ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
12922025-03-07T23:11:57.924ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12932025-03-07T23:11:57.925ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12942025-03-07T23:11:57.925ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12952025-03-07T23:11:57.927ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12962025-03-07T23:11:57.927ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12972025-03-07T23:11:57.929ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12982025-03-07T23:11:57.934ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12992025-03-07T23:11:57.935ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13002025-03-07T23:11:57.935ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13012025-03-07T23:11:57.937ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b0b83a02-2f14-43c5-ad65-1c2e26fa416b", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13022025-03-07T23:11:57.937ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
13032025-03-07T23:11:57.937ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13042025-03-07T23:11:57.939ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13052025-03-07T23:11:57.939ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13062025-03-07T23:11:57.941ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
13072025-03-07T23:11:57.941ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13082025-03-07T23:11:57.943ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13092025-03-07T23:11:57.943ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13102025-03-07T23:11:57.943ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13112025-03-07T23:11:57.947ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13122025-03-07T23:11:57.947ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13132025-03-07T23:11:57.947ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13142025-03-07T23:11:57.947ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13152025-03-07T23:11:57.948ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13162025-03-07T23:11:57.950ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13172025-03-07T23:11:57.950ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13182025-03-07T23:11:57.950ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13192025-03-07T23:11:57.953ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0710921-a6df-4c15-8a22-6478490a0522", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13202025-03-07T23:11:57.955ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
13212025-03-07T23:11:57.955ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13222025-03-07T23:11:57.963ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
13232025-03-07T23:11:57.963ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
13242025-03-07T23:11:57.963ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
13252025-03-07T23:11:57.963ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13262025-03-07T23:11:57.963ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13272025-03-07T23:11:57.963ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13282025-03-07T23:11:57.963ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13292025-03-07T23:11:57.964ZINFOtest_unauthorized (InternalApi): Recording Rack Network Configuration
13302025-03-07T23:11:57.965ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13312025-03-07T23:11:57.965ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13322025-03-07T23:11:57.965ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13332025-03-07T23:11:57.968ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b40ad030-c532-4008-9956-d779425c4c77", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13342025-03-07T23:11:57.968ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
13352025-03-07T23:11:57.970ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "961f3b12-61a8-4d36-82f5-2efba16675ae", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13362025-03-07T23:11:57.971ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
13372025-03-07T23:11:57.971ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad4339c8-e021-4287-9ee6-c5e2792b734e", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13382025-03-07T23:11:57.971ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
13392025-03-07T23:11:57.972ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad859e05-529e-447c-8919-7eceef3759b4", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13402025-03-07T23:11:57.973ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
13412025-03-07T23:11:57.975ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d2d5bd39-519a-4137-90d2-7c832fe2c511", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13422025-03-07T23:11:57.975ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
13432025-03-07T23:11:57.976ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "55a45616-af03-4fd5-91af-57728fc421fa", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13442025-03-07T23:11:57.977ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
13452025-03-07T23:11:57.979ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed9f4929-384f-410e-bd8c-d56b0840034f", "content-length": "734", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13462025-03-07T23:11:57.979ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
13472025-03-07T23:11:57.980ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13482025-03-07T23:11:57.981ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13492025-03-07T23:11:57.981ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13502025-03-07T23:11:57.981ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13512025-03-07T23:11:57.984ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13522025-03-07T23:11:57.984ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13532025-03-07T23:11:57.984ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13542025-03-07T23:11:57.986ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13552025-03-07T23:11:57.987ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13562025-03-07T23:11:57.997ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
13572025-03-07T23:11:57.998ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13582025-03-07T23:11:57.998ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13592025-03-07T23:11:57.999ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13602025-03-07T23:11:58.015ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "46388193-5217-4a47-bb37-ea1f4bfb775d", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13612025-03-07T23:11:58.019ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
13622025-03-07T23:11:58.019ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
13632025-03-07T23:11:58.019ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet
13642025-03-07T23:11:58.019ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13652025-03-07T23:11:58.019ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13662025-03-07T23:11:58.019ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13672025-03-07T23:11:58.019ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13682025-03-07T23:11:58.020ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5a14368c-c091-4d19-8150-4b64251066b3", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13692025-03-07T23:11:58.020ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
13702025-03-07T23:11:58.020ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13712025-03-07T23:11:58.025ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
13722025-03-07T23:11:58.025ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13732025-03-07T23:11:58.026ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13742025-03-07T23:11:58.026ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13752025-03-07T23:11:58.028ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "51ad643a-d151-465e-82bb-92e5564cc1c8", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13762025-03-07T23:11:58.029ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
13772025-03-07T23:11:58.031ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ce71b9e-7601-4af8-a11b-64487159c894", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13782025-03-07T23:11:58.031ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
13792025-03-07T23:11:58.033ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb22b04a-94fd-4ad6-be3a-a8e02979afff", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13802025-03-07T23:11:58.033ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
13812025-03-07T23:11:58.037ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b2079a8-fd39-47ea-86a8-687c267125ba", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13822025-03-07T23:11:58.038ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
13832025-03-07T23:11:58.039ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8bd3b8b7-7f29-457c-80f0-932f9e108db1", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13842025-03-07T23:11:58.039ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
13852025-03-07T23:11:58.040ZTRACtest_unauthorized (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:39:44.428621Z, time_modified: 2025-03-07T22:39:44.428621Z, allowed_ips: None } background_task = service_firewall_rule_propagation
13862025-03-07T23:11:58.041ZDEBGtest_unauthorized (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
13872025-03-07T23:11:58.041ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
13882025-03-07T23:11:58.041ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
13892025-03-07T23:11:58.041ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f805631f-d016-4b7b-abfb-bff7a29fe513", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13902025-03-07T23:11:58.042ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
13912025-03-07T23:11:58.043ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "422ccc86-a06c-4d66-b2e1-c704d380bb10", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13922025-03-07T23:11:58.043ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
13932025-03-07T23:11:58.044ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0f02a2ed-cf74-43fe-ac1c-01675342853d", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13942025-03-07T23:11:58.045ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
13952025-03-07T23:11:58.046ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "043f2b66-3510-42b1-819d-e3f0a17f542c", "content-length": "723", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13962025-03-07T23:11:58.047ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
13972025-03-07T23:11:58.049ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0bc78a3a-14af-495a-be0e-176f72c1c55a", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
13982025-03-07T23:11:58.050ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
13992025-03-07T23:11:58.054ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d67dd6b-c437-44df-beb5-e9370e2175ec", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14002025-03-07T23:11:58.055ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
14012025-03-07T23:11:58.057ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f322a6c-9e8a-4529-9138-4e592168bc9f", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14022025-03-07T23:11:58.058ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
14032025-03-07T23:11:58.059ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "93b28338-3c0c-41bb-990d-7a171fc95dab", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14042025-03-07T23:11:58.060ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
14052025-03-07T23:11:58.061ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1ef0bf60-90ca-4b73-b7f1-e483ba5bf959", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14062025-03-07T23:11:58.062ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
14072025-03-07T23:11:58.063ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cfa3665f-7356-4e2e-a260-50801414812b", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14082025-03-07T23:11:58.064ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
14092025-03-07T23:11:58.064ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bca0e1a6-18d4-4faf-92a0-74faeb9321b7", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14102025-03-07T23:11:58.064ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
14112025-03-07T23:11:58.065ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d915f53c-6b89-48db-9c60-d9b7622923fb", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14122025-03-07T23:11:58.066ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
14132025-03-07T23:11:58.066ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2a92f1b-b2fb-42a1-bc0f-14d4b1c453a9", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14142025-03-07T23:11:58.068ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
14152025-03-07T23:11:58.068ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "91a37a02-006a-4a34-b293-f0f8c448a7f2", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14162025-03-07T23:11:58.068ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
14172025-03-07T23:11:58.069ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd982c75-15ba-44e2-bf68-8a274f073fe4", "content-length": "723", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14182025-03-07T23:11:58.069ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
14192025-03-07T23:11:58.071ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d13f6ea-a17c-40ff-8eeb-9b460021615a", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14202025-03-07T23:11:58.071ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
14212025-03-07T23:11:58.073ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9f28af98-edff-4376-843a-02bd993f1140", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14222025-03-07T23:11:58.073ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
14232025-03-07T23:11:58.076ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3884f743-5428-4410-a4ef-f8c6ab4bac31", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14242025-03-07T23:11:58.076ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
14252025-03-07T23:11:58.076ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "999f679b-7a1c-435c-b1c3-af5093b81b90", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14262025-03-07T23:11:58.077ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
14272025-03-07T23:11:58.078ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed9bf7ac-56c0-4448-bb3d-5bb3f265f396", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14282025-03-07T23:11:58.078ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
14292025-03-07T23:11:58.081ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9a6b5489-2f42-4e75-9530-23fa0c819f57", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14302025-03-07T23:11:58.081ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
14312025-03-07T23:11:58.081ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "55a5ba8d-8b13-4843-8cdf-f4ab07b878f6", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14322025-03-07T23:11:58.081ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
14332025-03-07T23:11:58.084ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4a6f8df2-fca4-4ee7-971f-9e164d09143b", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14342025-03-07T23:11:58.086ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
14352025-03-07T23:11:58.086ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb55c0f2-3246-4a23-ab29-a1d222e483de", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14362025-03-07T23:11:58.086ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
14372025-03-07T23:11:58.086ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1fa5cf73-a3f6-4122-9703-1a79de9cfcae", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14382025-03-07T23:11:58.086ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14392025-03-07T23:11:58.086ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14402025-03-07T23:11:58.086ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14412025-03-07T23:11:58.086ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14422025-03-07T23:11:58.087ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14432025-03-07T23:11:58.089ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14442025-03-07T23:11:58.092ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14452025-03-07T23:11:58.099ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14462025-03-07T23:11:58.099ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14472025-03-07T23:11:58.099ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14482025-03-07T23:11:58.099ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14492025-03-07T23:11:58.099ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14502025-03-07T23:11:58.099ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14512025-03-07T23:11:58.101ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14522025-03-07T23:11:58.102ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14532025-03-07T23:11:58.102ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14542025-03-07T23:11:58.102ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14552025-03-07T23:11:58.147ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
14562025-03-07T23:11:58.148ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
14572025-03-07T23:11:58.148ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34782 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14582025-03-07T23:11:58.149ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34782 req_id = ba3353c8-3ddc-4054-a417-43741f263c5b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
14592025-03-07T23:11:58.149ZINFOtest_unauthorized (dropshot): request completed latency_us = 803 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34782 req_id = ba3353c8-3ddc-4054-a417-43741f263c5b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
14602025-03-07T23:11:58.151ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "ba3353c8-3ddc-4054-a417-43741f263c5b", "content-length": "2769", "date": "Fri, 07 Mar 2025 23:11:57 GMT"} })
14612025-03-07T23:11:58.153ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
14622025-03-07T23:11:58.153ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
14632025-03-07T23:11:58.153ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
14642025-03-07T23:11:58.154ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
14652025-03-07T23:11:58.157ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14662025-03-07T23:11:58.158ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14672025-03-07T23:11:58.158ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14682025-03-07T23:11:58.158ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14692025-03-07T23:11:58.161ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14702025-03-07T23:11:58.167ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
14712025-03-07T23:11:58.168ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14722025-03-07T23:11:58.168ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14732025-03-07T23:11:58.168ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14742025-03-07T23:11:58.180ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
14752025-03-07T23:11:58.182ZDEBGtest_unauthorized (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
14762025-03-07T23:11:58.182ZINFOtest_unauthorized (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
14772025-03-07T23:11:58.182ZDEBGtest_unauthorized (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 2.871759127s
14782025-03-07T23:11:58.182ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 2.871797278s iteration = 1 status = {}
14792025-03-07T23:11:58.212ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
14802025-03-07T23:11:58.214ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14812025-03-07T23:11:58.214ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14822025-03-07T23:11:58.214ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14832025-03-07T23:11:58.215ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14842025-03-07T23:11:58.216ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14852025-03-07T23:11:58.220ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
14862025-03-07T23:11:58.220ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14872025-03-07T23:11:58.220ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14882025-03-07T23:11:58.220ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14892025-03-07T23:11:58.225ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") }
14902025-03-07T23:11:58.225ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14912025-03-07T23:11:58.225ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14922025-03-07T23:11:58.225ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14932025-03-07T23:11:58.226ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14942025-03-07T23:11:58.228ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14952025-03-07T23:11:58.237ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(())
14962025-03-07T23:11:58.237ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14972025-03-07T23:11:58.238ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14982025-03-07T23:11:58.238ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14992025-03-07T23:11:58.254ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") }
15002025-03-07T23:11:58.255ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15012025-03-07T23:11:58.255ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15022025-03-07T23:11:58.255ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15032025-03-07T23:11:58.255ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15042025-03-07T23:11:58.257ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15052025-03-07T23:11:58.263ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15062025-03-07T23:11:58.320ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") }
15072025-03-07T23:11:58.320ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15082025-03-07T23:11:58.320ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15092025-03-07T23:11:58.320ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15102025-03-07T23:11:58.321ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15112025-03-07T23:11:58.322ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15122025-03-07T23:11:58.327ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15132025-03-07T23:11:58.333ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
15142025-03-07T23:11:58.334ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15152025-03-07T23:11:58.335ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15162025-03-07T23:11:58.335ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15172025-03-07T23:11:58.335ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15182025-03-07T23:11:58.339ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15192025-03-07T23:11:58.343ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
15202025-03-07T23:11:59.007ZINFOtest_unauthorized (InternalApi): inserted blueprint blueprint_id = a3818c9f-fa3a-4b21-969a-331f3bbe4342
15212025-03-07T23:11:59.007ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
15222025-03-07T23:11:59.007ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15232025-03-07T23:11:59.007ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15242025-03-07T23:11:59.007ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15252025-03-07T23:11:59.008ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15262025-03-07T23:11:59.010ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15272025-03-07T23:11:59.015ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
15282025-03-07T23:11:59.031ZINFOtest_unauthorized (InternalApi): No networking records needed for crucible_pantry service
15292025-03-07T23:11:59.096ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = ee68d9db-a598-40b9-abec-64d117a8e69d
15302025-03-07T23:11:59.096ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = ee68d9db-a598-40b9-abec-64d117a8e69d time_started = 2025-03-07 23:11:57.752056 UTC
15312025-03-07T23:11:59.097ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.774170106s iteration = 2 status = {"collection_id":"ee68d9db-a598-40b9-abec-64d117a8e69d","time_done":"2025-03-07 23:11:58.153973 UTC","time_started":"2025-03-07 23:11:57.752056 UTC"}
15322025-03-07T23:11:59.098ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
15332025-03-07T23:11:59.098ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 144.853\u{b5}s iteration = 2 status = {"error":"task disabled"}
15342025-03-07T23:11:59.098ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 2 reason = Dependency
15352025-03-07T23:11:59.098ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
15362025-03-07T23:11:59.098ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 23.36\u{b5}s iteration = 2 status = {"error":"no blueprint"}
15372025-03-07T23:11:59.184ZINFOtest_unauthorized (InternalApi): Inserted networking records for external_dns service
15382025-03-07T23:11:59.184ZINFOtest_unauthorized (InternalApi): No networking records needed for clickhouse service
15392025-03-07T23:11:59.185ZINFOtest_unauthorized (InternalApi): No networking records needed for internal_dns service
15402025-03-07T23:11:59.185ZINFOtest_unauthorized (InternalApi): No networking records needed for cockroach_db service
15412025-03-07T23:11:59.236ZINFOtest_unauthorized (InternalApi): Inserted networking records for nexus service
15422025-03-07T23:11:59.237ZINFOtest_unauthorized (InternalApi): Inserted service networking records
15432025-03-07T23:11:59.237ZINFOtest_unauthorized (InternalApi): Inserted physical disks
15442025-03-07T23:11:59.237ZINFOtest_unauthorized (InternalApi): Inserted zpools
15452025-03-07T23:11:59.237ZINFOtest_unauthorized (InternalApi): Inserted datasets
15462025-03-07T23:11:59.279ZINFOtest_unauthorized (InternalApi): Populated DNS tables for internal DNS
15472025-03-07T23:11:59.285ZINFOtest_unauthorized (InternalApi): Populated DNS tables for external DNS
15482025-03-07T23:11:59.291ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15492025-03-07T23:11:59.291ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15502025-03-07T23:11:59.291ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15512025-03-07T23:11:59.291ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15522025-03-07T23:11:59.292ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15532025-03-07T23:11:59.292ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15542025-03-07T23:11:59.292ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15552025-03-07T23:11:59.292ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15562025-03-07T23:11:59.292ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15572025-03-07T23:11:59.292ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15582025-03-07T23:11:59.292ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15592025-03-07T23:11:59.292ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15602025-03-07T23:11:59.297ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15612025-03-07T23:11:59.303ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15622025-03-07T23:11:59.314ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15632025-03-07T23:11:59.315ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15642025-03-07T23:11:59.315ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15652025-03-07T23:11:59.315ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15662025-03-07T23:11:59.315ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15672025-03-07T23:11:59.318ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15682025-03-07T23:11:59.332ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15692025-03-07T23:11:59.332ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15702025-03-07T23:11:59.332ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15712025-03-07T23:11:59.332ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15722025-03-07T23:11:59.332ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15732025-03-07T23:11:59.333ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15742025-03-07T23:11:59.336ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15752025-03-07T23:11:59.344ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15762025-03-07T23:11:59.345ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15772025-03-07T23:11:59.346ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15782025-03-07T23:11:59.346ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15792025-03-07T23:11:59.346ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15802025-03-07T23:11:59.346ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15812025-03-07T23:11:59.348ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15822025-03-07T23:11:59.357ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15832025-03-07T23:11:59.364ZINFOtest_unauthorized (InternalApi): Created recovery silo
15842025-03-07T23:11:59.365ZINFOtest_unauthorized (InternalApi): Created recovery user
15852025-03-07T23:11:59.411ZINFOtest_unauthorized (InternalApi): Created recovery user's password
15862025-03-07T23:11:59.411ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, lookup_type: ById(0bb91424-f90c-4f11-acbb-98367ae5ccd9) }
15872025-03-07T23:11:59.411ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 0bb91424-f90c-4f11-acbb-98367ae5ccd9 resource_type = Silo
15882025-03-07T23:11:59.411ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15892025-03-07T23:11:59.411ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15902025-03-07T23:11:59.413ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15912025-03-07T23:11:59.415ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15922025-03-07T23:11:59.415ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15932025-03-07T23:11:59.415ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15942025-03-07T23:11:59.415ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15952025-03-07T23:11:59.416ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15962025-03-07T23:11:59.419ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, lookup_type: ById(0bb91424-f90c-4f11-acbb-98367ae5ccd9) } result = Ok(())
15972025-03-07T23:11:59.420ZDEBGtest_unauthorized (InternalApi): Generated role assignment queries
15982025-03-07T23:11:59.423ZINFOtest_unauthorized (InternalApi): Granted Silo privileges
15992025-03-07T23:11:59.423ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16002025-03-07T23:11:59.423ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16012025-03-07T23:11:59.423ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16022025-03-07T23:11:59.423ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16032025-03-07T23:11:59.424ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16042025-03-07T23:11:59.426ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16052025-03-07T23:11:59.429ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16062025-03-07T23:11:59.462ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16072025-03-07T23:11:59.463ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16082025-03-07T23:11:59.464ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16092025-03-07T23:11:59.466ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16102025-03-07T23:11:59.466ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16112025-03-07T23:11:59.468ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16122025-03-07T23:11:59.470ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16132025-03-07T23:11:59.470ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16142025-03-07T23:11:59.471ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16152025-03-07T23:11:59.472ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16162025-03-07T23:11:59.473ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16172025-03-07T23:11:59.473ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16182025-03-07T23:11:59.473ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16192025-03-07T23:11:59.473ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16202025-03-07T23:11:59.474ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16212025-03-07T23:11:59.475ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16222025-03-07T23:11:59.475ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16232025-03-07T23:11:59.475ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16242025-03-07T23:11:59.481ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16252025-03-07T23:11:59.481ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16262025-03-07T23:11:59.481ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16272025-03-07T23:11:59.482ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16282025-03-07T23:11:59.484ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16292025-03-07T23:11:59.493ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16302025-03-07T23:11:59.494ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16312025-03-07T23:11:59.494ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16322025-03-07T23:11:59.494ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16332025-03-07T23:11:59.494ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16342025-03-07T23:11:59.494ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16352025-03-07T23:11:59.495ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16362025-03-07T23:11:59.498ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16372025-03-07T23:11:59.499ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16382025-03-07T23:11:59.499ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16392025-03-07T23:11:59.499ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16402025-03-07T23:11:59.500ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16412025-03-07T23:11:59.500ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16422025-03-07T23:11:59.500ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16432025-03-07T23:11:59.500ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16442025-03-07T23:11:59.502ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16452025-03-07T23:11:59.511ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16462025-03-07T23:11:59.511ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16472025-03-07T23:11:59.511ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16482025-03-07T23:11:59.512ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16492025-03-07T23:11:59.514ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16502025-03-07T23:11:59.514ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16512025-03-07T23:11:59.515ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16522025-03-07T23:11:59.517ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16532025-03-07T23:11:59.518ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16542025-03-07T23:11:59.518ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16552025-03-07T23:11:59.519ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16562025-03-07T23:11:59.519ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16572025-03-07T23:11:59.520ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16582025-03-07T23:11:59.522ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16592025-03-07T23:11:59.523ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16602025-03-07T23:11:59.523ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16612025-03-07T23:11:59.523ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16622025-03-07T23:11:59.523ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16632025-03-07T23:11:59.524ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16642025-03-07T23:11:59.524ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16652025-03-07T23:11:59.524ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16662025-03-07T23:11:59.525ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16672025-03-07T23:11:59.526ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16682025-03-07T23:11:59.526ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16692025-03-07T23:11:59.526ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16702025-03-07T23:11:59.526ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16712025-03-07T23:11:59.530ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16722025-03-07T23:11:59.539ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16732025-03-07T23:11:59.539ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16742025-03-07T23:11:59.539ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16752025-03-07T23:11:59.539ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16762025-03-07T23:11:59.539ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16772025-03-07T23:11:59.541ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16782025-03-07T23:11:59.541ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16792025-03-07T23:11:59.542ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16802025-03-07T23:11:59.543ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16812025-03-07T23:11:59.543ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16822025-03-07T23:11:59.544ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16832025-03-07T23:11:59.545ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16842025-03-07T23:11:59.547ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16852025-03-07T23:11:59.547ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16862025-03-07T23:11:59.547ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
16872025-03-07T23:11:59.548ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16882025-03-07T23:11:59.548ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16892025-03-07T23:11:59.548ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16902025-03-07T23:11:59.548ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16912025-03-07T23:11:59.549ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16922025-03-07T23:11:59.549ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16932025-03-07T23:11:59.549ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16942025-03-07T23:11:59.549ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16952025-03-07T23:11:59.551ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16962025-03-07T23:11:59.551ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16972025-03-07T23:11:59.551ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16982025-03-07T23:11:59.551ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16992025-03-07T23:11:59.552ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17002025-03-07T23:11:59.561ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17012025-03-07T23:11:59.561ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17022025-03-07T23:11:59.561ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17032025-03-07T23:11:59.561ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17042025-03-07T23:11:59.561ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17052025-03-07T23:11:59.561ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17062025-03-07T23:11:59.561ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17072025-03-07T23:11:59.563ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17082025-03-07T23:11:59.563ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17092025-03-07T23:11:59.563ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17102025-03-07T23:11:59.564ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17112025-03-07T23:11:59.566ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17122025-03-07T23:11:59.567ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17132025-03-07T23:11:59.567ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17142025-03-07T23:11:59.567ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17152025-03-07T23:11:59.568ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17162025-03-07T23:11:59.575ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17172025-03-07T23:11:59.576ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17182025-03-07T23:11:59.576ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17192025-03-07T23:11:59.576ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17202025-03-07T23:11:59.579ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17212025-03-07T23:11:59.579ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17222025-03-07T23:11:59.581ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17232025-03-07T23:11:59.582ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17242025-03-07T23:11:59.582ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17252025-03-07T23:11:59.583ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17262025-03-07T23:11:59.584ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17272025-03-07T23:11:59.584ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17282025-03-07T23:11:59.584ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17292025-03-07T23:11:59.586ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17302025-03-07T23:11:59.586ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17312025-03-07T23:11:59.586ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17322025-03-07T23:11:59.588ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17332025-03-07T23:11:59.588ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17342025-03-07T23:11:59.588ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17352025-03-07T23:11:59.588ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17362025-03-07T23:11:59.588ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17372025-03-07T23:11:59.590ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17382025-03-07T23:11:59.590ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17392025-03-07T23:11:59.591ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17402025-03-07T23:11:59.591ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17412025-03-07T23:11:59.592ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17422025-03-07T23:11:59.593ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17432025-03-07T23:11:59.593ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17442025-03-07T23:11:59.593ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17452025-03-07T23:11:59.594ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17462025-03-07T23:11:59.600ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17472025-03-07T23:11:59.602ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17482025-03-07T23:11:59.602ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17492025-03-07T23:11:59.602ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17502025-03-07T23:11:59.602ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17512025-03-07T23:11:59.602ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17522025-03-07T23:11:59.602ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17532025-03-07T23:11:59.603ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17542025-03-07T23:11:59.603ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17552025-03-07T23:11:59.603ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17562025-03-07T23:11:59.603ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17572025-03-07T23:11:59.605ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17582025-03-07T23:11:59.606ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17592025-03-07T23:11:59.606ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17602025-03-07T23:11:59.606ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17612025-03-07T23:11:59.607ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17622025-03-07T23:11:59.615ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17632025-03-07T23:11:59.616ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17642025-03-07T23:11:59.616ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17652025-03-07T23:11:59.616ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17662025-03-07T23:11:59.622ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 5c43ff85-533f-4aec-8db8-483123ea263e, kind: Service { id: 1c4efb37-65f0-4b83-b583-7e876e3ca3e9 }, name: Name("external-dns-1c4efb37-65f0-4b83-b583-7e876e3ca3e9"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: 5963162b-1793-4dc3-b3e7-78a6a1795bff, kind: Service { id: cedd38c4-2f15-4a76-91e3-9d4bc49191a8 }, name: Name("nexus-cedd38c4-2f15-4a76-91e3-9d4bc49191a8"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
17672025-03-07T23:11:59.622ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
17682025-03-07T23:11:59.622ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17692025-03-07T23:11:59.622ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17702025-03-07T23:11:59.622ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17712025-03-07T23:11:59.622ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17722025-03-07T23:11:59.624ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17732025-03-07T23:11:59.627ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
17742025-03-07T23:11:59.627ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17752025-03-07T23:11:59.627ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17762025-03-07T23:11:59.628ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17772025-03-07T23:11:59.629ZTRACtest_unauthorized (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:39:44.428621Z, time_modified: 2025-03-07T23:11:59.429863Z, allowed_ips: None }
17782025-03-07T23:11:59.629ZDEBGtest_unauthorized (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
17792025-03-07T23:11:59.629ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 5c43ff85-533f-4aec-8db8-483123ea263e, kind: Service { id: 1c4efb37-65f0-4b83-b583-7e876e3ca3e9 }, name: Name("external-dns-1c4efb37-65f0-4b83-b583-7e876e3ca3e9"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 5963162b-1793-4dc3-b3e7-78a6a1795bff, kind: Service { id: cedd38c4-2f15-4a76-91e3-9d4bc49191a8 }, name: Name("nexus-cedd38c4-2f15-4a76-91e3-9d4bc49191a8"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
17802025-03-07T23:11:59.630ZDEBGtest_unauthorized (nexus): resolved 2 rules for sleds
17812025-03-07T23:11:59.658ZDEBGtest_unauthorized (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-07T23:11:55.336090Z, time_modified: 2025-03-07T23:11:55.336090Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(41065), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(35509) }]
17822025-03-07T23:11:59.659ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
17832025-03-07T23:11:59.659ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17842025-03-07T23:11:59.659ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
17852025-03-07T23:11:59.659ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17862025-03-07T23:11:59.661ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
17872025-03-07T23:11:59.662ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17882025-03-07T23:11:59.662ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17892025-03-07T23:11:59.662ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
17902025-03-07T23:11:59.662ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17912025-03-07T23:11:59.664ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
17922025-03-07T23:11:59.667ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
17932025-03-07T23:11:59.695ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:41065/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17942025-03-07T23:11:59.696ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34786 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17952025-03-07T23:11:59.696ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34786 req_id = 2da00531-e539-4d4b-ae43-33f209ca2535 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17962025-03-07T23:11:59.696ZINFOtest_unauthorized (dropshot): request completed latency_us = 538 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34786 req_id = 2da00531-e539-4d4b-ae43-33f209ca2535 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17972025-03-07T23:11:59.696ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:41065/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "2da00531-e539-4d4b-ae43-33f209ca2535", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
17982025-03-07T23:11:59.697ZINFOtest_unauthorized (nexus): updated firewall rules on 1 sleds
17992025-03-07T23:11:59.697ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18002025-03-07T23:11:59.699ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
18012025-03-07T23:11:59.699ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18022025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
18032025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
18042025-03-07T23:11:59.699ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18052025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18062025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18072025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
18082025-03-07T23:11:59.699ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
18092025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
18102025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
18112025-03-07T23:11:59.699ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18122025-03-07T23:11:59.699ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18132025-03-07T23:11:59.700ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18142025-03-07T23:11:59.701ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
18152025-03-07T23:11:59.701ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
18162025-03-07T23:11:59.701ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
18172025-03-07T23:11:59.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
18182025-03-07T23:11:59.701ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18192025-03-07T23:11:59.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18202025-03-07T23:11:59.701ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18212025-03-07T23:11:59.701ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18222025-03-07T23:11:59.701ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
18232025-03-07T23:11:59.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
18242025-03-07T23:11:59.702ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18252025-03-07T23:11:59.703ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18262025-03-07T23:11:59.703ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18272025-03-07T23:11:59.703ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18282025-03-07T23:11:59.703ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 34 65 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 4e..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:58043 req_id = 4e2cee32-dc96-4873-80ba-6da5cff02915
18292025-03-07T23:11:59.703ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 13413,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58043 req_id = 4e2cee32-dc96-4873-80ba-6da5cff02915
18302025-03-07T23:11:59.703ZDEBGtest_unauthorized (store): query key key = _nameservice._tcp
18312025-03-07T23:11:59.703ZDEBGtest_unauthorized (store): query key key = 28a47900-2f91-401f-929b-b6803f4d8da7.host
18322025-03-07T23:11:59.703ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:58043 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35595, target: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal") })) }] req_id = 4e2cee32-dc96-4873-80ba-6da5cff02915
18332025-03-07T23:11:59.703ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 77 57 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 wW..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:62508 req_id = 97533ccb-f656-4a21-bc23-126789da5122
18342025-03-07T23:11:59.703ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30551,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62508 req_id = 97533ccb-f656-4a21-bc23-126789da5122
18352025-03-07T23:11:59.703ZDEBGtest_unauthorized (store): query key key = _external-dns._tcp
18362025-03-07T23:11:59.704ZDEBGtest_unauthorized (store): query key key = 1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host
18372025-03-07T23:11:59.704ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:62508 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45425, target: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal") })) }] req_id = 97533ccb-f656-4a21-bc23-126789da5122
18382025-03-07T23:11:59.704ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35595, target: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2804, tv_nsec: 480819618 } })
18392025-03-07T23:11:59.704ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
18402025-03-07T23:11:59.704ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45425, target: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2804, tv_nsec: 481117586 } })
18412025-03-07T23:11:59.704ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
18422025-03-07T23:11:59.704ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18432025-03-07T23:11:59.704ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18442025-03-07T23:11:59.704ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18452025-03-07T23:11:59.704ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18462025-03-07T23:11:59.705ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18472025-03-07T23:11:59.705ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
18482025-03-07T23:11:59.705ZTRACtest_unauthorized (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18492025-03-07T23:11:59.705ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18502025-03-07T23:11:59.705ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
18512025-03-07T23:11:59.705ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18522025-03-07T23:11:59.705ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
18532025-03-07T23:11:59.706ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18542025-03-07T23:11:59.706ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18552025-03-07T23:11:59.706ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18562025-03-07T23:11:59.706ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18572025-03-07T23:11:59.706ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 8a 72 01 00 00 01 00 00 00 00 00 01 24 32 38 61 .r..........$28a\n0010: 34 37 39 30 30 2d 32 66 39 31 2d 34 30 31 66 2d 47900-2f91-401f-\n0020: 39 32 39 62 2d 62 36 38 30 33 66 34 64 38 64 61 929b-b6803f4d8da\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:61267 req_id = 4856287f-c15f-40c6-9020-dce84c1524e3
18582025-03-07T23:11:59.708ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 35442,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 50,\n 56,\n 97,\n 52,\n 55,\n 57,\n 48,\n 48,\n 45,\n 50,\n 102,\n 57,\n 49,\n 45,\n 52,\n 48,\n 49,\n 102,\n 45,\n 57,\n 50,\n 57,\n 98,\n 45,\n 98,\n 54,\n 56,\n 48,\n 51,\n 102,\n 52,\n 100,\n 56,\n 100,\n 97,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61267 req_id = 4856287f-c15f-40c6-9020-dce84c1524e3
18592025-03-07T23:11:59.708ZDEBGtest_unauthorized (store): query key key = 28a47900-2f91-401f-929b-b6803f4d8da7.host
18602025-03-07T23:11:59.708ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:61267 query = LowerQuery { name: LowerName(Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal.")), original: Query { name: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 4856287f-c15f-40c6-9020-dce84c1524e3
18612025-03-07T23:11:59.708ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: f1 f5 01 00 00 01 00 00 00 00 00 01 24 31 63 34 ............$1c4\n0010: 65 66 62 33 37 2d 36 35 66 30 2d 34 62 38 33 2d efb37-65f0-4b83-\n0020: 62 35 38 33 2d 37 65 38 37 36 65 33 63 61 33 65 b583-7e876e3ca3e\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:56279 req_id = 6953206b-0f67-4e02-bd97-5ccbfb93c645
18622025-03-07T23:11:59.708ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61941,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 49,\n 99,\n 52,\n 101,\n 102,\n 98,\n 51,\n 55,\n 45,\n 54,\n 53,\n 102,\n 48,\n 45,\n 52,\n 98,\n 56,\n 51,\n 45,\n 98,\n 53,\n 56,\n 51,\n 45,\n 55,\n 101,\n 56,\n 55,\n 54,\n 101,\n 51,\n 99,\n 97,\n 51,\n 101,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56279 req_id = 6953206b-0f67-4e02-bd97-5ccbfb93c645
18632025-03-07T23:11:59.708ZDEBGtest_unauthorized (store): query key key = 1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host
18642025-03-07T23:11:59.709ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:56279 query = LowerQuery { name: LowerName(Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal.")), original: Query { name: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 6953206b-0f67-4e02-bd97-5ccbfb93c645
18652025-03-07T23:11:59.709ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:35595] } background_task = dns_servers_internal dns_group = internal
18662025-03-07T23:11:59.709ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 8.392918ms iteration = 2 status = {"addresses":["[::1]:35595"]}
18672025-03-07T23:11:59.709ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:45425] } background_task = dns_servers_external dns_group = external
18682025-03-07T23:11:59.709ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 7.7181ms iteration = 2 status = {"addresses":["[::1]:45425"]}
18692025-03-07T23:11:59.709ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
18702025-03-07T23:11:59.709ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
18712025-03-07T23:11:59.710ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 25.591\u{b5}s iteration = 2 status = {"error":"no config"}
18722025-03-07T23:11:59.710ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
18732025-03-07T23:11:59.711ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
18742025-03-07T23:11:59.711ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 18.321\u{b5}s iteration = 2 status = {"error":"no config"}
18752025-03-07T23:11:59.711ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18762025-03-07T23:11:59.711ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
18772025-03-07T23:11:59.711ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18782025-03-07T23:11:59.711ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18792025-03-07T23:11:59.711ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18802025-03-07T23:11:59.712ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18812025-03-07T23:11:59.715ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
18822025-03-07T23:11:59.715ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18832025-03-07T23:11:59.715ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18842025-03-07T23:11:59.715ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18852025-03-07T23:11:59.715ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18862025-03-07T23:11:59.721ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
18872025-03-07T23:11:59.723ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
18882025-03-07T23:11:59.724ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
18892025-03-07T23:11:59.724ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
18902025-03-07T23:11:59.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18912025-03-07T23:11:59.724ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18922025-03-07T23:11:59.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18932025-03-07T23:11:59.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18942025-03-07T23:11:59.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18952025-03-07T23:11:59.725ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18962025-03-07T23:11:59.729ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
18972025-03-07T23:11:59.729ZINFOtest_unauthorized (nexus): Rack initialized
18982025-03-07T23:11:59.730ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18992025-03-07T23:11:59.730ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19002025-03-07T23:11:59.730ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19012025-03-07T23:11:59.730ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19022025-03-07T23:11:59.735ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19032025-03-07T23:11:59.735ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
19042025-03-07T23:11:59.736ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19052025-03-07T23:11:59.736ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19062025-03-07T23:11:59.736ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19072025-03-07T23:11:59.736ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19082025-03-07T23:11:59.737ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19092025-03-07T23:11:59.742ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19102025-03-07T23:11:59.742ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19112025-03-07T23:11:59.742ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19122025-03-07T23:11:59.743ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19132025-03-07T23:11:59.745ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19142025-03-07T23:11:59.745ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19152025-03-07T23:11:59.746ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19162025-03-07T23:11:59.746ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19172025-03-07T23:11:59.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
19182025-03-07T23:11:59.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19192025-03-07T23:11:59.751ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19202025-03-07T23:11:59.751ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19212025-03-07T23:11:59.754ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19222025-03-07T23:11:59.755ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19232025-03-07T23:11:59.755ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19242025-03-07T23:11:59.755ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
19252025-03-07T23:11:59.755ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19262025-03-07T23:11:59.755ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19272025-03-07T23:11:59.756ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19282025-03-07T23:11:59.756ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19292025-03-07T23:11:59.757ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
19302025-03-07T23:11:59.757ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19312025-03-07T23:11:59.757ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19322025-03-07T23:11:59.757ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19332025-03-07T23:11:59.757ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19342025-03-07T23:11:59.759ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19352025-03-07T23:11:59.763ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
19362025-03-07T23:11:59.763ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19372025-03-07T23:11:59.763ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19382025-03-07T23:11:59.764ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19392025-03-07T23:11:59.766ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(ee68d9db-a598-40b9-abec-64d117a8e69d, 0)]
19402025-03-07T23:11:59.766ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
19412025-03-07T23:11:59.769ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: c7 28 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .(..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:62354 req_id = eb770f46-7b70-40f0-a186-421d4b52ce14
19422025-03-07T23:11:59.769ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50984,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62354 req_id = eb770f46-7b70-40f0-a186-421d4b52ce14
19432025-03-07T23:11:59.769ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
19442025-03-07T23:11:59.769ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19452025-03-07T23:11:59.769ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:62354 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = eb770f46-7b70-40f0-a186-421d4b52ce14
19462025-03-07T23:11:59.770ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2804, tv_nsec: 547365048 } })
19472025-03-07T23:11:59.770ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
19482025-03-07T23:11:59.774ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: aa 1e 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:53463 req_id = 885b31a0-68a3-4de8-b7a8-0f5fa44d4cb7
19492025-03-07T23:11:59.775ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 43550,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53463 req_id = 885b31a0-68a3-4de8-b7a8-0f5fa44d4cb7
19502025-03-07T23:11:59.775ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19512025-03-07T23:11:59.775ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:53463 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 885b31a0-68a3-4de8-b7a8-0f5fa44d4cb7
19522025-03-07T23:11:59.810ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
19532025-03-07T23:11:59.811ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
19542025-03-07T23:11:59.811ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
19552025-03-07T23:11:59.811ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
19562025-03-07T23:11:59.811ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19572025-03-07T23:11:59.811ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19582025-03-07T23:11:59.811ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19592025-03-07T23:11:59.812ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19602025-03-07T23:11:59.812ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19612025-03-07T23:11:59.814ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
19622025-03-07T23:11:59.814ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 98f8d76d-226d-4227-aa9e-508cf7188778 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
19632025-03-07T23:11:59.814ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19642025-03-07T23:11:59.814ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19652025-03-07T23:11:59.814ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19662025-03-07T23:11:59.814ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19672025-03-07T23:11:59.814ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19682025-03-07T23:11:59.815ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19692025-03-07T23:11:59.821ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19702025-03-07T23:11:59.822ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19712025-03-07T23:11:59.822ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19722025-03-07T23:11:59.822ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19732025-03-07T23:11:59.823ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19742025-03-07T23:11:59.823ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19752025-03-07T23:11:59.823ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19762025-03-07T23:11:59.824ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19772025-03-07T23:11:59.825ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: ef 19 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:57321 req_id = 057896e2-391c-493d-a382-c639f2152be8
19782025-03-07T23:11:59.825ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61209,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57321 req_id = 057896e2-391c-493d-a382-c639f2152be8
19792025-03-07T23:11:59.825ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
19802025-03-07T23:11:59.825ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 61209, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57321 req_id = 057896e2-391c-493d-a382-c639f2152be8
19812025-03-07T23:11:59.825ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19822025-03-07T23:11:59.831ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19832025-03-07T23:11:59.831ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19842025-03-07T23:11:59.831ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19852025-03-07T23:11:59.832ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19862025-03-07T23:11:59.833ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
19872025-03-07T23:11:59.833ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
19882025-03-07T23:11:59.833ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
19892025-03-07T23:11:59.836ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19902025-03-07T23:11:59.836ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19912025-03-07T23:11:59.836ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19922025-03-07T23:11:59.836ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19932025-03-07T23:11:59.839ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 98f8d76d-226d-4227-aa9e-508cf7188778 dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
19942025-03-07T23:11:59.840ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
19952025-03-07T23:11:59.840ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
19962025-03-07T23:11:59.840ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 141.138098ms iteration = 2 status = {"generation":1}
19972025-03-07T23:11:59.840ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
19982025-03-07T23:11:59.880ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:35595] } uri = http://[::1]:35595/config
19992025-03-07T23:11:59.891ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:11:52.978055Z, time_modified: 2025-03-07T23:11:52.978055Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
20002025-03-07T23:11:59.891ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 180.906772ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]}},"default_endpoint":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0bb91424-f90c-4f11-acbb-98367ae5ccd9 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
20012025-03-07T23:11:59.892ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
20022025-03-07T23:11:59.892ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
20032025-03-07T23:11:59.892ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20042025-03-07T23:11:59.894ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20052025-03-07T23:11:59.894ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20062025-03-07T23:11:59.894ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20072025-03-07T23:11:59.894ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20082025-03-07T23:11:59.894ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:35595 remote_addr = [::1]:52000
20092025-03-07T23:11:59.894ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:35595 method = PUT remote_addr = [::1]:52000 req_id = 9b7756d2-badf-4ed4-a917-661abdc9bfd3 uri = /config
20102025-03-07T23:11:59.894ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 9b7756d2-badf-4ed4-a917-661abdc9bfd3
20112025-03-07T23:11:59.894ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 9b7756d2-badf-4ed4-a917-661abdc9bfd3
20122025-03-07T23:11:59.894ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 7212 local_addr = [::1]:35595 method = PUT remote_addr = [::1]:52000 req_id = 9b7756d2-badf-4ed4-a917-661abdc9bfd3 response_code = 204 uri = /config
20132025-03-07T23:11:59.894ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20142025-03-07T23:11:59.898ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20152025-03-07T23:11:59.898ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20162025-03-07T23:11:59.898ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20172025-03-07T23:11:59.899ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20182025-03-07T23:11:59.900ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20192025-03-07T23:11:59.906ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20202025-03-07T23:11:59.908ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
20212025-03-07T23:11:59.908ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20222025-03-07T23:11:59.908ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20232025-03-07T23:11:59.908ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20242025-03-07T23:11:59.908ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20252025-03-07T23:11:59.908ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20262025-03-07T23:11:59.908ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb60a9c3-cd58-41c1-9569-4ae8a547782a", "content-length": "835", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20272025-03-07T23:11:59.908ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
20282025-03-07T23:11:59.908ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 result = Ok(Response { url: "http://[::1]:35595/config", status: 204, headers: {"x-request-id": "9b7756d2-badf-4ed4-a917-661abdc9bfd3", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} }) servers = DnsServersList { addresses: [[::1]:35595] }
20292025-03-07T23:11:59.908ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 servers = DnsServersList { addresses: [[::1]:35595] }
20302025-03-07T23:11:59.909ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:35595] }
20312025-03-07T23:11:59.910ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 69.452816ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:35595":{"Ok":null}}}
20322025-03-07T23:11:59.914ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 1 version = 2
20332025-03-07T23:11:59.917ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
20342025-03-07T23:11:59.917ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
20352025-03-07T23:11:59.917ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 215.602564ms iteration = 2 status = {"generation":2}
20362025-03-07T23:11:59.918ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
20372025-03-07T23:11:59.944ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:45425 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:45425] } uri = http://[::1]:45425/config
20382025-03-07T23:11:59.945ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:45425 remote_addr = [::1]:33406
20392025-03-07T23:11:59.945ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33406 req_id = 277afaf3-6ea6-48a8-a622-3601f9f9d062 uri = /config
20402025-03-07T23:11:59.947ZINFOtest_unauthorized (store): attempting generation update new_generation = 2 req_id = 277afaf3-6ea6-48a8-a622-3601f9f9d062
20412025-03-07T23:11:59.947ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
20422025-03-07T23:11:59.947ZDEBGtest_unauthorized (store): creating tree tree_name = generation_2_zone_oxide-dev.test
20432025-03-07T23:11:59.947ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20442025-03-07T23:11:59.947ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20452025-03-07T23:11:59.947ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20462025-03-07T23:11:59.947ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20472025-03-07T23:11:59.948ZDEBGtest_unauthorized (store): updating current config
20482025-03-07T23:11:59.949ZDEBGtest_unauthorized (store): flushing default tree
20492025-03-07T23:11:59.949ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b47508e2-6e4a-4711-ac5a-25dd48f57007", "content-length": "734", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20502025-03-07T23:11:59.949ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
20512025-03-07T23:11:59.949ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20522025-03-07T23:11:59.949ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20532025-03-07T23:11:59.950ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20542025-03-07T23:11:59.950ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20552025-03-07T23:11:59.951ZINFOtest_unauthorized (store): pruning trees for generations older than 2 keep = 3
20562025-03-07T23:11:59.951ZINFOtest_unauthorized (store): updated generation new_generation = 2 req_id = 277afaf3-6ea6-48a8-a622-3601f9f9d062
20572025-03-07T23:11:59.951ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 5564 local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33406 req_id = 277afaf3-6ea6-48a8-a622-3601f9f9d062 response_code = 204 uri = /config
20582025-03-07T23:11:59.951ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 2 result = Ok(Response { url: "http://[::1]:45425/config", status: 204, headers: {"x-request-id": "277afaf3-6ea6-48a8-a622-3601f9f9d062", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} }) servers = DnsServersList { addresses: [[::1]:45425] }
20592025-03-07T23:11:59.951ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 2 servers = DnsServersList { addresses: [[::1]:45425] }
20602025-03-07T23:11:59.952ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:45425] }
20612025-03-07T23:11:59.953ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 37.491864ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:45425":{"Ok":null}}}
20622025-03-07T23:11:59.953ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20632025-03-07T23:11:59.959ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20642025-03-07T23:11:59.960ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20652025-03-07T23:11:59.960ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20662025-03-07T23:11:59.960ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20672025-03-07T23:11:59.963ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20682025-03-07T23:11:59.964ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20692025-03-07T23:11:59.965ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20702025-03-07T23:11:59.971ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b570c947-5945-470f-9d76-182f5068c503", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20712025-03-07T23:11:59.971ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
20722025-03-07T23:11:59.971ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20732025-03-07T23:11:59.971ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20742025-03-07T23:11:59.971ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20752025-03-07T23:11:59.971ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20762025-03-07T23:11:59.971ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20772025-03-07T23:11:59.971ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20782025-03-07T23:11:59.971ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "660f9e67-1178-4f3b-9df7-72c5e34a6dcd", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20792025-03-07T23:11:59.971ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
20802025-03-07T23:11:59.971ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20812025-03-07T23:11:59.971ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20822025-03-07T23:11:59.971ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20832025-03-07T23:11:59.971ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20842025-03-07T23:11:59.972ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20852025-03-07T23:11:59.973ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "77345b81-f54d-4637-b4fc-9cd229872f80", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20862025-03-07T23:11:59.975ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
20872025-03-07T23:11:59.975ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20882025-03-07T23:11:59.975ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20892025-03-07T23:11:59.975ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20902025-03-07T23:11:59.975ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20912025-03-07T23:11:59.976ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20922025-03-07T23:11:59.980ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20932025-03-07T23:11:59.980ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20942025-03-07T23:11:59.980ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20952025-03-07T23:11:59.980ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1932b38-362a-40a7-aa62-ff3cf50f4fa4", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
20962025-03-07T23:11:59.980ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
20972025-03-07T23:11:59.980ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20982025-03-07T23:11:59.983ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20992025-03-07T23:11:59.983ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21002025-03-07T23:11:59.983ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21012025-03-07T23:11:59.983ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21022025-03-07T23:11:59.983ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21032025-03-07T23:11:59.985ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9bb74f4f-a969-40fd-b88b-2abaced4d198", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21042025-03-07T23:11:59.985ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
21052025-03-07T23:11:59.987ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21062025-03-07T23:11:59.987ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21072025-03-07T23:11:59.987ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21082025-03-07T23:11:59.988ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21092025-03-07T23:11:59.989ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21102025-03-07T23:11:59.989ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21112025-03-07T23:11:59.989ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b376a6a3-6315-49ac-86bd-f2769517dc81", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21122025-03-07T23:11:59.989ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
21132025-03-07T23:11:59.990ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "969399f6-3624-4d1d-8d35-fa73b3665a2d", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21142025-03-07T23:11:59.992ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
21152025-03-07T23:11:59.992ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21162025-03-07T23:11:59.992ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21172025-03-07T23:11:59.992ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21182025-03-07T23:11:59.992ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f43b9b93-9335-4040-b6fb-8ec60ef97a7a", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21192025-03-07T23:11:59.992ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
21202025-03-07T23:11:59.994ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
21212025-03-07T23:11:59.994ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21222025-03-07T23:11:59.994ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21232025-03-07T23:11:59.994ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21242025-03-07T23:11:59.994ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21252025-03-07T23:11:59.994ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5002fd62-9212-4b4c-97db-a30a504c9650", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21262025-03-07T23:11:59.994ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
21272025-03-07T23:11:59.995ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad8ea826-16a0-4df2-ac1a-f0c8320e4aa5", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21282025-03-07T23:11:59.996ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
21292025-03-07T23:11:59.996ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21302025-03-07T23:11:59.996ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21312025-03-07T23:11:59.996ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21322025-03-07T23:11:59.996ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21332025-03-07T23:11:59.997ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3cb3a608-52ae-48df-9da9-7a7935e8afa3", "content-length": "734", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21342025-03-07T23:11:59.998ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
21352025-03-07T23:11:59.998ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21362025-03-07T23:11:59.998ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21372025-03-07T23:11:59.998ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21382025-03-07T23:11:59.998ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21392025-03-07T23:12:00.000ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21402025-03-07T23:12:00.008ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
21412025-03-07T23:12:00.008ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
21422025-03-07T23:12:00.008ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
21432025-03-07T23:12:00.008ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21442025-03-07T23:12:00.008ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21452025-03-07T23:12:00.008ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21462025-03-07T23:12:00.008ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21472025-03-07T23:12:00.009ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e21634da-3ae8-4545-86db-9439ae6f9ae3", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21482025-03-07T23:12:00.011ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
21492025-03-07T23:12:00.011ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21502025-03-07T23:12:00.011ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21512025-03-07T23:12:00.011ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21522025-03-07T23:12:00.012ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21532025-03-07T23:12:00.013ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d32abed5-2412-48a7-9cfe-f71cb4a44711", "content-length": "111", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21542025-03-07T23:12:00.013ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
21552025-03-07T23:12:00.014ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21562025-03-07T23:12:00.015ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21572025-03-07T23:12:00.015ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21582025-03-07T23:12:00.015ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21592025-03-07T23:12:00.016ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "18d2e981-921d-40b4-bd4a-d28430f1383b", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21602025-03-07T23:12:00.016ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
21612025-03-07T23:12:00.016ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21622025-03-07T23:12:00.023ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
21632025-03-07T23:12:00.023ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21642025-03-07T23:12:00.023ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21652025-03-07T23:12:00.023ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21662025-03-07T23:12:00.026ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "56b44d24-5802-40b5-a64d-dc697854cd7a", "content-length": "167", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21672025-03-07T23:12:00.027ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
21682025-03-07T23:12:00.027ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21692025-03-07T23:12:00.028ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21702025-03-07T23:12:00.028ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21712025-03-07T23:12:00.029ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f68ae2b8-5d52-44d4-b9b7-b54fb8b18365", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21722025-03-07T23:12:00.029ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
21732025-03-07T23:12:00.030ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21742025-03-07T23:12:00.030ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21752025-03-07T23:12:00.030ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21762025-03-07T23:12:00.031ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "50ad1a01-a4a1-42f9-bd57-724546680d42", "content-length": "175", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21772025-03-07T23:12:00.031ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
21782025-03-07T23:12:00.032ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21792025-03-07T23:12:00.033ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21802025-03-07T23:12:00.033ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21812025-03-07T23:12:00.034ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b42aa9e3-865b-44c7-9c15-f741dcd1c92c", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21822025-03-07T23:12:00.034ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
21832025-03-07T23:12:00.035ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bd27c69d-fc27-4b2d-b787-23358bc90e6e", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21842025-03-07T23:12:00.036ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
21852025-03-07T23:12:00.036ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21862025-03-07T23:12:00.036ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21872025-03-07T23:12:00.036ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21882025-03-07T23:12:00.036ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d9cce60f-19bf-453b-b177-24227cbb580f", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21892025-03-07T23:12:00.036ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
21902025-03-07T23:12:00.037ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "69448a04-dd19-4380-85a4-f939901bc122", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21912025-03-07T23:12:00.039ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
21922025-03-07T23:12:00.039ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21932025-03-07T23:12:00.039ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21942025-03-07T23:12:00.039ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21952025-03-07T23:12:00.039ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21962025-03-07T23:12:00.039ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21972025-03-07T23:12:00.039ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "36fd0ea4-5cbf-4295-9568-aa19ff26c997", "content-length": "723", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
21982025-03-07T23:12:00.039ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
21992025-03-07T23:12:00.040ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22002025-03-07T23:12:00.040ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22012025-03-07T23:12:00.040ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22022025-03-07T23:12:00.041ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22032025-03-07T23:12:00.042ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22042025-03-07T23:12:00.043ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22052025-03-07T23:12:00.043ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22062025-03-07T23:12:00.043ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22072025-03-07T23:12:00.043ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6328058d-bf40-4345-89c2-4ef8f5cf4c56", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22082025-03-07T23:12:00.043ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
22092025-03-07T23:12:00.044ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22102025-03-07T23:12:00.050ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22112025-03-07T23:12:00.050ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22122025-03-07T23:12:00.050ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
22132025-03-07T23:12:00.050ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22142025-03-07T23:12:00.050ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22152025-03-07T23:12:00.050ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22162025-03-07T23:12:00.051ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22172025-03-07T23:12:00.053ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b95ee9d7-95a8-454f-ac6a-e70f43bfabc7", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22182025-03-07T23:12:00.053ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
22192025-03-07T23:12:00.054ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22202025-03-07T23:12:00.055ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22212025-03-07T23:12:00.055ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22222025-03-07T23:12:00.055ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22232025-03-07T23:12:00.056ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6309701c-8b24-47c6-9c57-5976db4fe7b2", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22242025-03-07T23:12:00.057ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
22252025-03-07T23:12:00.057ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22262025-03-07T23:12:00.057ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22272025-03-07T23:12:00.057ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22282025-03-07T23:12:00.057ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22292025-03-07T23:12:00.058ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22302025-03-07T23:12:00.064ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22312025-03-07T23:12:00.064ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22322025-03-07T23:12:00.064ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22332025-03-07T23:12:00.064ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22342025-03-07T23:12:00.064ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad8253f4-f301-4b0b-a95d-f3b4db9ec7a0", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22352025-03-07T23:12:00.066ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
22362025-03-07T23:12:00.067ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1e3d06e-4e11-4bef-8a19-126564b04d3c", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22372025-03-07T23:12:00.068ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
22382025-03-07T23:12:00.069ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc24be4e-86b3-4ef7-9a32-d9565221b0f4", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22392025-03-07T23:12:00.069ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
22402025-03-07T23:12:00.070ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec353730-1415-49b4-b8c6-29bc43accd3c", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22412025-03-07T23:12:00.070ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
22422025-03-07T23:12:00.071ZDEBGtest_unauthorized (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 5c43ff85-533f-4aec-8db8-483123ea263e, kind: Service { id: 1c4efb37-65f0-4b83-b583-7e876e3ca3e9 }, name: Name("external-dns-1c4efb37-65f0-4b83-b583-7e876e3ca3e9"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: 5963162b-1793-4dc3-b3e7-78a6a1795bff, kind: Service { id: cedd38c4-2f15-4a76-91e3-9d4bc49191a8 }, name: Name("nexus-cedd38c4-2f15-4a76-91e3-9d4bc49191a8"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
22432025-03-07T23:12:00.071ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
22442025-03-07T23:12:00.071ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22452025-03-07T23:12:00.071ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22462025-03-07T23:12:00.071ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22472025-03-07T23:12:00.071ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22482025-03-07T23:12:00.073ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f848ba56-49b1-409d-9767-0f48cab75ff7", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22492025-03-07T23:12:00.073ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
22502025-03-07T23:12:00.073ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e3ab3a8-b83b-4c9c-84c2-7cb411b81c5c", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22512025-03-07T23:12:00.074ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
22522025-03-07T23:12:00.074ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22532025-03-07T23:12:00.076ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
22542025-03-07T23:12:00.077ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22552025-03-07T23:12:00.077ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22562025-03-07T23:12:00.078ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22572025-03-07T23:12:00.078ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e921ad47-1a75-45bf-9736-84afe31a2a40", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22582025-03-07T23:12:00.078ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
22592025-03-07T23:12:00.079ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "01f95251-96ad-4820-91d7-6710cbaca14b", "content-length": "723", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22602025-03-07T23:12:00.080ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
22612025-03-07T23:12:00.080ZTRACtest_unauthorized (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:39:44.428621Z, time_modified: 2025-03-07T23:11:59.429863Z, allowed_ips: None }
22622025-03-07T23:12:00.080ZDEBGtest_unauthorized (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
22632025-03-07T23:12:00.080ZDEBGtest_unauthorized (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 5c43ff85-533f-4aec-8db8-483123ea263e, kind: Service { id: 1c4efb37-65f0-4b83-b583-7e876e3ca3e9 }, name: Name("external-dns-1c4efb37-65f0-4b83-b583-7e876e3ca3e9"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 5963162b-1793-4dc3-b3e7-78a6a1795bff, kind: Service { id: cedd38c4-2f15-4a76-91e3-9d4bc49191a8 }, name: Name("nexus-cedd38c4-2f15-4a76-91e3-9d4bc49191a8"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
22642025-03-07T23:12:00.080ZDEBGtest_unauthorized (InternalApi): resolved 2 rules for sleds
22652025-03-07T23:12:00.082ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b2a16d20-95fb-491c-93b0-443956326732", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22662025-03-07T23:12:00.082ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
22672025-03-07T23:12:00.085ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b6e248b-dfc1-45b3-9d2b-fca01652642a", "content-length": "109", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22682025-03-07T23:12:00.085ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
22692025-03-07T23:12:00.091ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "175bea12-f0ee-44a4-a60c-a4164cb34c63", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22702025-03-07T23:12:00.092ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
22712025-03-07T23:12:00.092ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "80db90a9-49d7-4274-8a0b-6af3416204c5", "content-length": "169", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22722025-03-07T23:12:00.093ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
22732025-03-07T23:12:00.093ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7f06760b-eaaf-4fae-9056-0a4dee07c4c6", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22742025-03-07T23:12:00.093ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
22752025-03-07T23:12:00.093ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f2f82e44-4d56-44fc-9276-ce75e879cb9b", "content-length": "178", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22762025-03-07T23:12:00.093ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
22772025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "615a4710-30a4-4077-a37e-64ec8cded1a1", "content-length": "702", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22782025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
22792025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3c08595a-decd-4ea4-a6c2-83adbb192a00", "content-length": "727", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22802025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
22812025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "956af708-a1ed-45c1-83c0-84ec878fff2f", "content-length": "729", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22822025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
22832025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fcf4f378-6427-49e0-a874-39a6443eebe1", "content-length": "728", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
22842025-03-07T23:12:00.096ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
22852025-03-07T23:12:00.096ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22862025-03-07T23:12:00.096ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
22872025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
22882025-03-07T23:12:00.096ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
22892025-03-07T23:12:00.097ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22902025-03-07T23:12:00.101ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
22912025-03-07T23:12:00.101ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
22922025-03-07T23:12:00.101ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22932025-03-07T23:12:00.101ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
22942025-03-07T23:12:00.101ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
22952025-03-07T23:12:00.101ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
22962025-03-07T23:12:00.115ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22972025-03-07T23:12:00.118ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
22982025-03-07T23:12:00.123ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
22992025-03-07T23:12:00.123ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23002025-03-07T23:12:00.123ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
23012025-03-07T23:12:00.123ZDEBGtest_unauthorized (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-07T23:11:55.336090Z, time_modified: 2025-03-07T23:11:55.336090Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(41065), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(35509) }]
23022025-03-07T23:12:00.123ZDEBGtest_unauthorized (InternalApi): sending firewall rules to sled agents
23032025-03-07T23:12:00.123ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23042025-03-07T23:12:00.123ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23052025-03-07T23:12:00.123ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23062025-03-07T23:12:00.129ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
23072025-03-07T23:12:00.129ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23082025-03-07T23:12:00.130ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23092025-03-07T23:12:00.130ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23102025-03-07T23:12:00.130ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23112025-03-07T23:12:00.175ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
23122025-03-07T23:12:00.175ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
23132025-03-07T23:12:00.176ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34788 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23142025-03-07T23:12:00.177ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34788 req_id = f70aa803-68f3-41d3-b4b2-c748137cb370 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
23152025-03-07T23:12:00.177ZINFOtest_unauthorized (dropshot): request completed latency_us = 410 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34788 req_id = f70aa803-68f3-41d3-b4b2-c748137cb370 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
23162025-03-07T23:12:00.179ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23172025-03-07T23:12:00.185ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
23182025-03-07T23:12:00.222ZDEBGtest_unauthorized (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:41065/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23192025-03-07T23:12:00.223ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "f70aa803-68f3-41d3-b4b2-c748137cb370", "content-length": "2769", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
23202025-03-07T23:12:00.224ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
23212025-03-07T23:12:00.225ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
23222025-03-07T23:12:00.226ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
23232025-03-07T23:12:00.228ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
23242025-03-07T23:12:00.228ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23252025-03-07T23:12:00.228ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
23262025-03-07T23:12:00.228ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23272025-03-07T23:12:00.229ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
23282025-03-07T23:12:00.231ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34790 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23292025-03-07T23:12:00.232ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34790 req_id = 4ae28abb-8968-44df-bae0-e163573ae8b9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23302025-03-07T23:12:00.232ZINFOtest_unauthorized (dropshot): request completed latency_us = 765 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34790 req_id = 4ae28abb-8968-44df-bae0-e163573ae8b9 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23312025-03-07T23:12:00.232ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23322025-03-07T23:12:00.237ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
23332025-03-07T23:12:00.238ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
23342025-03-07T23:12:00.238ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23352025-03-07T23:12:00.238ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
23362025-03-07T23:12:00.238ZDEBGtest_unauthorized (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:41065/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "4ae28abb-8968-44df-bae0-e163573ae8b9", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
23372025-03-07T23:12:00.240ZINFOtest_unauthorized (InternalApi): updated firewall rules on 1 sleds
23382025-03-07T23:12:00.240ZINFOtest_unauthorized (nexus): plumbed initial IP allowlist
23392025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = / versions = all
23402025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /access versions = all
23412025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /assets/{path} versions = all
23422025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /device/auth versions = all
23432025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /device/confirm versions = all
23442025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /device/success versions = all
23452025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /device/token versions = all
23462025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /device/verify versions = all
23472025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/probes versions = all
23482025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /experimental/v1/probes versions = all
23492025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /experimental/v1/probes/{probe} versions = all
23502025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/probes/{probe} versions = all
23512025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/system/support-bundles versions = all
23522025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /experimental/v1/system/support-bundles versions = all
23532025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23542025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23552025-03-07T23:12:00.280ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23562025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23572025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23582025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23592025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
23602025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /images versions = all
23612025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /login versions = all
23622025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /login/{silo_name}/local versions = all
23632025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
23642025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
23652025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
23662025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /lookup/{path} versions = all
23672025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /projects/{path} versions = all
23682025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /projects-new versions = all
23692025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /settings/{path} versions = all
23702025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /system/{path} versions = all
23712025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /utilization versions = all
23722025-03-07T23:12:00.281ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/affinity-groups versions = all
23732025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/affinity-groups versions = all
23742025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
23752025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
23762025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
23772025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
23782025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23792025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23802025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23812025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/anti-affinity-groups versions = all
23822025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/anti-affinity-groups versions = all
23832025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23842025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23852025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23862025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
23872025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23882025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23892025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23902025-03-07T23:12:00.282ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23912025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23922025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23932025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/certificates versions = all
23942025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/certificates versions = all
23952025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/certificates/{certificate} versions = all
23962025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/certificates/{certificate} versions = all
23972025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/disks versions = all
23982025-03-07T23:12:00.283ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/disks versions = all
23992025-03-07T23:12:00.287ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/disks/{disk} versions = all
24002025-03-07T23:12:00.288ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/disks/{disk} versions = all
24012025-03-07T23:12:00.288ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/disks/{disk}/bulk-write versions = all
24022025-03-07T23:12:00.288ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
24032025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
24042025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/disks/{disk}/finalize versions = all
24052025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
24062025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/floating-ips versions = all
24072025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/floating-ips versions = all
24082025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
24092025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/floating-ips/{floating_ip} versions = all
24102025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
24112025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
24122025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
24132025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/groups versions = all
24142025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/groups/{group_id} versions = all
24152025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/images versions = all
24162025-03-07T23:12:00.289ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/images versions = all
24172025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/images/{image} versions = all
24182025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/images/{image} versions = all
24192025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/images/{image}/demote versions = all
24202025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/images/{image}/promote versions = all
24212025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances versions = all
24222025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances versions = all
24232025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/instances/{instance} versions = all
24242025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance} versions = all
24252025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/instances/{instance} versions = all
24262025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance}/disks versions = all
24272025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/disks/attach versions = all
24282025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/disks/detach versions = all
24292025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance}/external-ips versions = all
24302025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
24312025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
24322025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/reboot versions = all
24332025-03-07T23:12:00.290ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance}/serial-console versions = all
24342025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
24352025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
24362025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/start versions = all
24372025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/instances/{instance}/stop versions = all
24382025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/internet-gateway-ip-addresses versions = all
24392025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/internet-gateway-ip-addresses versions = all
24402025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
24412025-03-07T23:12:00.291ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/internet-gateway-ip-pools versions = all
24422025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/internet-gateway-ip-pools versions = all
24432025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
24442025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/internet-gateways versions = all
24452025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/internet-gateways versions = all
24462025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
24472025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/internet-gateways/{gateway} versions = all
24482025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/ip-pools versions = all
24492025-03-07T23:12:00.292ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/ip-pools/{pool} versions = all
24502025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/login/{silo_name}/local versions = all
24512025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/logout versions = all
24522025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/me versions = all
24532025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/me/groups versions = all
24542025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/me/ssh-keys versions = all
24552025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/me/ssh-keys versions = all
24562025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
24572025-03-07T23:12:00.293ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
24582025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/metrics/{metric_name} versions = all
24592025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/network-interfaces versions = all
24602025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/network-interfaces versions = all
24612025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/network-interfaces/{interface} versions = all
24622025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/network-interfaces/{interface} versions = all
24632025-03-07T23:12:00.294ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/network-interfaces/{interface} versions = all
24642025-03-07T23:12:00.295ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/ping versions = all
24652025-03-07T23:12:00.295ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/policy versions = all
24662025-03-07T23:12:00.295ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/policy versions = all
24672025-03-07T23:12:00.295ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/projects versions = all
24682025-03-07T23:12:00.295ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/projects versions = all
24692025-03-07T23:12:00.303ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/projects/{project} versions = all
24702025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/projects/{project} versions = all
24712025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/projects/{project} versions = all
24722025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/projects/{project}/policy versions = all
24732025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/projects/{project}/policy versions = all
24742025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/snapshots versions = all
24752025-03-07T23:12:00.317ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/snapshots versions = all
24762025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/snapshots/{snapshot} versions = all
24772025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/snapshots/{snapshot} versions = all
24782025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/disks versions = all
24792025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
24802025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
24812025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/racks versions = all
24822025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
24832025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/sleds versions = all
24842025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/hardware/sleds versions = all
24852025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
24862025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
24872025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
24882025-03-07T23:12:00.318ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
24892025-03-07T23:12:00.319ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
24902025-03-07T23:12:00.319ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/switch-port versions = all
24912025-03-07T23:12:00.319ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24922025-03-07T23:12:00.320ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24932025-03-07T23:12:00.321ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
24942025-03-07T23:12:00.321ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
24952025-03-07T23:12:00.321ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
24962025-03-07T23:12:00.328ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/switches versions = all
24972025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
24982025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/identity-providers versions = all
24992025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/identity-providers/local/users versions = all
25002025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
25012025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
25022025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/identity-providers/saml versions = all
25032025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
25042025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools versions = all
25052025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools versions = all
25062025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
25072025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools/{pool} versions = all
25082025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/ip-pools/{pool} versions = all
25092025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
25102025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
25112025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
25122025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
25132025-03-07T23:12:00.334ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
25142025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
25152025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
25162025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
25172025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools-service versions = all
25182025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/ip-pools-service/ranges versions = all
25192025-03-07T23:12:00.335ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
25202025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
25212025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/metrics/{metric_name} versions = all
25222025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/address-lot versions = all
25232025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/address-lot versions = all
25242025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
25252025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
25262025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/allow-list versions = all
25272025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/networking/allow-list versions = all
25282025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/bfd-disable versions = all
25292025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/bfd-enable versions = all
25302025-03-07T23:12:00.339ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bfd-status versions = all
25312025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/networking/bgp versions = all
25322025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp versions = all
25332025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/bgp versions = all
25342025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-announce-set versions = all
25352025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
25362025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
25372025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
25382025-03-07T23:12:00.340ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-exported versions = all
25392025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-message-history versions = all
25402025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
25412025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/bgp-status versions = all
25422025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/loopback-address versions = all
25432025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/loopback-address versions = all
25442025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
25452025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
25462025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/switch-port-settings versions = all
25472025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/networking/switch-port-settings versions = all
25482025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
25492025-03-07T23:12:00.341ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/policy versions = all
25502025-03-07T23:12:00.342ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/policy versions = all
25512025-03-07T23:12:00.342ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/roles versions = all
25522025-03-07T23:12:00.342ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/roles/{role_name} versions = all
25532025-03-07T23:12:00.342ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silo-quotas versions = all
25542025-03-07T23:12:00.342ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silos versions = all
25552025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/silos versions = all
25562025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/system/silos/{silo} versions = all
25572025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silos/{silo} versions = all
25582025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
25592025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silos/{silo}/policy versions = all
25602025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/silos/{silo}/policy versions = all
25612025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/silos/{silo}/quotas versions = all
25622025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
25632025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/system/timeseries/query versions = all
25642025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/timeseries/schemas versions = all
25652025-03-07T23:12:00.343ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/update/repository versions = all
25662025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/update/repository/{system_version} versions = all
25672025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/update/target-release versions = all
25682025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/system/update/target-release versions = all
25692025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/users versions = all
25702025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/users/{user_id} versions = all
25712025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/users-builtin versions = all
25722025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/users-builtin/{user} versions = all
25732025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/utilization/silos versions = all
25742025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/system/utilization/silos/{silo} versions = all
25752025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/timeseries/query versions = all
25762025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/users versions = all
25772025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/utilization versions = all
25782025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-firewall-rules versions = all
25792025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/vpc-firewall-rules versions = all
25802025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-router-routes versions = all
25812025-03-07T23:12:00.344ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/vpc-router-routes versions = all
25822025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
25832025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-router-routes/{route} versions = all
25842025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/vpc-router-routes/{route} versions = all
25852025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-routers versions = all
25862025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/vpc-routers versions = all
25872025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/vpc-routers/{router} versions = all
25882025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-routers/{router} versions = all
25892025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/vpc-routers/{router} versions = all
25902025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-subnets versions = all
25912025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/vpc-subnets versions = all
25922025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
25932025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-subnets/{subnet} versions = all
25942025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
25952025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
25962025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpcs versions = all
25972025-03-07T23:12:00.345ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = POST path = /v1/vpcs versions = all
25982025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = DELETE path = /v1/vpcs/{vpc} versions = all
25992025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = GET path = /v1/vpcs/{vpc} versions = all
26002025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:41589 method = PUT path = /v1/vpcs/{vpc} versions = all
26012025-03-07T23:12:00.346ZINFOtest_unauthorized (dropshot_external): listening local_addr = 127.0.0.1:41589
26022025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:41589
26032025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = / versions = all
26042025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /access versions = all
26052025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /assets/{path} versions = all
26062025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /device/auth versions = all
26072025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /device/confirm versions = all
26082025-03-07T23:12:00.346ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /device/success versions = all
26092025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /device/token versions = all
26102025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /device/verify versions = all
26112025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/probes versions = all
26122025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /experimental/v1/probes versions = all
26132025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /experimental/v1/probes/{probe} versions = all
26142025-03-07T23:12:00.351ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/probes/{probe} versions = all
26152025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/system/support-bundles versions = all
26162025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /experimental/v1/system/support-bundles versions = all
26172025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
26182025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
26192025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
26202025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
26212025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
26222025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
26232025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
26242025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /images versions = all
26252025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /login versions = all
26262025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /login/{silo_name}/local versions = all
26272025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
26282025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
26292025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
26302025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /lookup/{path} versions = all
26312025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /projects/{path} versions = all
26322025-03-07T23:12:00.352ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /projects-new versions = all
26332025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /settings/{path} versions = all
26342025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /system/{path} versions = all
26352025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /utilization versions = all
26362025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/affinity-groups versions = all
26372025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/affinity-groups versions = all
26382025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
26392025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
26402025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
26412025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
26422025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26432025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26442025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26452025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/anti-affinity-groups versions = all
26462025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/anti-affinity-groups versions = all
26472025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26482025-03-07T23:12:00.353ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26492025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26502025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
26512025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26522025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26532025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26542025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26552025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26562025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26572025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/certificates versions = all
26582025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/certificates versions = all
26592025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/certificates/{certificate} versions = all
26602025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/certificates/{certificate} versions = all
26612025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/disks versions = all
26622025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/disks versions = all
26632025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/disks/{disk} versions = all
26642025-03-07T23:12:00.354ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/disks/{disk} versions = all
26652025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/disks/{disk}/bulk-write versions = all
26662025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
26672025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
26682025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/disks/{disk}/finalize versions = all
26692025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
26702025-03-07T23:12:00.355ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/floating-ips versions = all
26712025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/floating-ips versions = all
26722025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
26732025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/floating-ips/{floating_ip} versions = all
26742025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
26752025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
26762025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
26772025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/groups versions = all
26782025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/groups/{group_id} versions = all
26792025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/images versions = all
26802025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/images versions = all
26812025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/images/{image} versions = all
26822025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/images/{image} versions = all
26832025-03-07T23:12:00.356ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/images/{image}/demote versions = all
26842025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/images/{image}/promote versions = all
26852025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances versions = all
26862025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances versions = all
26872025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/instances/{instance} versions = all
26882025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance} versions = all
26892025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/instances/{instance} versions = all
26902025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance}/disks versions = all
26912025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/disks/attach versions = all
26922025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/disks/detach versions = all
26932025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance}/external-ips versions = all
26942025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26952025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26962025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/reboot versions = all
26972025-03-07T23:12:00.357ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance}/serial-console versions = all
26982025-03-07T23:12:00.358ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
26992025-03-07T23:12:00.358ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
27002025-03-07T23:12:00.358ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/start versions = all
27012025-03-07T23:12:00.358ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/instances/{instance}/stop versions = all
27022025-03-07T23:12:00.358ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/internet-gateway-ip-addresses versions = all
27032025-03-07T23:12:00.363ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/internet-gateway-ip-addresses versions = all
27042025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
27052025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/internet-gateway-ip-pools versions = all
27062025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/internet-gateway-ip-pools versions = all
27072025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
27082025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/internet-gateways versions = all
27092025-03-07T23:12:00.364ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/internet-gateways versions = all
27102025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
27112025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/internet-gateways/{gateway} versions = all
27122025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/ip-pools versions = all
27132025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/ip-pools/{pool} versions = all
27142025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/login/{silo_name}/local versions = all
27152025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/logout versions = all
27162025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/me versions = all
27172025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/me/groups versions = all
27182025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/me/ssh-keys versions = all
27192025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/me/ssh-keys versions = all
27202025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
27212025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
27222025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/metrics/{metric_name} versions = all
27232025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/network-interfaces versions = all
27242025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/network-interfaces versions = all
27252025-03-07T23:12:00.365ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/network-interfaces/{interface} versions = all
27262025-03-07T23:12:00.366ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/network-interfaces/{interface} versions = all
27272025-03-07T23:12:00.366ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/network-interfaces/{interface} versions = all
27282025-03-07T23:12:00.366ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/ping versions = all
27292025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/policy versions = all
27302025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/policy versions = all
27312025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/projects versions = all
27322025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/projects versions = all
27332025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/projects/{project} versions = all
27342025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/projects/{project} versions = all
27352025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/projects/{project} versions = all
27362025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/projects/{project}/policy versions = all
27372025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/projects/{project}/policy versions = all
27382025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/snapshots versions = all
27392025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/snapshots versions = all
27402025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/snapshots/{snapshot} versions = all
27412025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/snapshots/{snapshot} versions = all
27422025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/disks versions = all
27432025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
27442025-03-07T23:12:00.367ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
27452025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/racks versions = all
27462025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
27472025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/sleds versions = all
27482025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/hardware/sleds versions = all
27492025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
27502025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
27512025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
27522025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
27532025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
27542025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/switch-port versions = all
27552025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
27562025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
27572025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
27582025-03-07T23:12:00.368ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
27592025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
27602025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/switches versions = all
27612025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
27622025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/identity-providers versions = all
27632025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/identity-providers/local/users versions = all
27642025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
27652025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
27662025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/identity-providers/saml versions = all
27672025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
27682025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools versions = all
27692025-03-07T23:12:00.369ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools versions = all
27702025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
27712025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools/{pool} versions = all
27722025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/ip-pools/{pool} versions = all
27732025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
27742025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
27752025-03-07T23:12:00.370ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
27762025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
27772025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
27782025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
27792025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
27802025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
27812025-03-07T23:12:00.371ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools-service versions = all
27822025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/ip-pools-service/ranges versions = all
27832025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
27842025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
27852025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/metrics/{metric_name} versions = all
27862025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/address-lot versions = all
27872025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/address-lot versions = all
27882025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
27892025-03-07T23:12:00.372ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
27902025-03-07T23:12:00.373ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/allow-list versions = all
27912025-03-07T23:12:00.373ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/networking/allow-list versions = all
27922025-03-07T23:12:00.373ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/bfd-disable versions = all
27932025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/bfd-enable versions = all
27942025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bfd-status versions = all
27952025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/networking/bgp versions = all
27962025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp versions = all
27972025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/bgp versions = all
27982025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-announce-set versions = all
27992025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
28002025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
28012025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
28022025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-exported versions = all
28032025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-message-history versions = all
28042025-03-07T23:12:00.374ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
28052025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/bgp-status versions = all
28062025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/loopback-address versions = all
28072025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/loopback-address versions = all
28082025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
28092025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
28102025-03-07T23:12:00.375ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/switch-port-settings versions = all
28112025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/networking/switch-port-settings versions = all
28122025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
28132025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/policy versions = all
28142025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/policy versions = all
28152025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/roles versions = all
28162025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/roles/{role_name} versions = all
28172025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silo-quotas versions = all
28182025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silos versions = all
28192025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/silos versions = all
28202025-03-07T23:12:00.376ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/system/silos/{silo} versions = all
28212025-03-07T23:12:00.377ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silos/{silo} versions = all
28222025-03-07T23:12:00.377ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
28232025-03-07T23:12:00.377ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silos/{silo}/policy versions = all
28242025-03-07T23:12:00.377ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/silos/{silo}/policy versions = all
28252025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/silos/{silo}/quotas versions = all
28262025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
28272025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/system/timeseries/query versions = all
28282025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/timeseries/schemas versions = all
28292025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/update/repository versions = all
28302025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/update/repository/{system_version} versions = all
28312025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/update/target-release versions = all
28322025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/system/update/target-release versions = all
28332025-03-07T23:12:00.378ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/users versions = all
28342025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/users/{user_id} versions = all
28352025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/users-builtin versions = all
28362025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/users-builtin/{user} versions = all
28372025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/utilization/silos versions = all
28382025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/system/utilization/silos/{silo} versions = all
28392025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/timeseries/query versions = all
28402025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/users versions = all
28412025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/utilization versions = all
28422025-03-07T23:12:00.379ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-firewall-rules versions = all
28432025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/vpc-firewall-rules versions = all
28442025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-router-routes versions = all
28452025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/vpc-router-routes versions = all
28462025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
28472025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-router-routes/{route} versions = all
28482025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/vpc-router-routes/{route} versions = all
28492025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-routers versions = all
28502025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/vpc-routers versions = all
28512025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/vpc-routers/{router} versions = all
28522025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-routers/{router} versions = all
28532025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/vpc-routers/{router} versions = all
28542025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-subnets versions = all
28552025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/vpc-subnets versions = all
28562025-03-07T23:12:00.380ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
28572025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-subnets/{subnet} versions = all
28582025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
28592025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
28602025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpcs versions = all
28612025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = POST path = /v1/vpcs versions = all
28622025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = DELETE path = /v1/vpcs/{vpc} versions = all
28632025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = GET path = /v1/vpcs/{vpc} versions = all
28642025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:43971 method = PUT path = /v1/vpcs/{vpc} versions = all
28652025-03-07T23:12:00.382ZINFOtest_unauthorized (dropshot_external_techport): listening local_addr = 127.0.0.1:43971
28662025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:43971
28672025-03-07T23:12:00.382ZDEBGtest_unauthorized (nexus-producer-server): registered DTrace probes
28682025-03-07T23:12:00.382ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = 127.0.0.1:35155 method = GET path = /{producer_id} versions = all
28692025-03-07T23:12:00.382ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:328 local_addr = 127.0.0.1:35155
28702025-03-07T23:12:00.383ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:35155
28712025-03-07T23:12:00.383ZDEBGtest_unauthorized (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:35155
28722025-03-07T23:12:00.383ZDEBGtest_unauthorized (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:43523
28732025-03-07T23:12:00.383ZDEBGtest_unauthorized (nexus-producer-server): starting producer registration task
28742025-03-07T23:12:00.383ZINFOtest_unauthorized (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:35155 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
28752025-03-07T23:12:00.383ZDEBGtest_unauthorized (init_with_steps): Running step start_oximeter
28762025-03-07T23:12:00.383ZDEBGtest_unauthorized: Starting Oximeter
28772025-03-07T23:12:00.383ZDEBGtest_unauthorized (oximeter): registered DTrace probes
28782025-03-07T23:12:00.383ZINFOtest_unauthorized (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:236
28792025-03-07T23:12:00.383ZDEBGtest_unauthorized (oximeter): creating ClickHouse client
28802025-03-07T23:12:00.383ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
28812025-03-07T23:12:00.383ZDEBGtest_unauthorized (producer-registration-task): registering / renewing oximeter producer lease with Nexus
28822025-03-07T23:12:00.383ZDEBGtest_unauthorized (producer-registration-task): using nexus address for registration addr = 127.0.0.1:43523
28832025-03-07T23:12:00.384ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:43523/metrics/producers
28842025-03-07T23:12:00.385ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38986
28852025-03-07T23:12:00.385ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38986 req_id = ef10c0e8-11c4-443c-9dd6-d678d50703f2 uri = /metrics/producers
28862025-03-07T23:12:00.385ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38986 req_id = ef10c0e8-11c4-443c-9dd6-d678d50703f2 resource = Database uri = /metrics/producers
28872025-03-07T23:12:00.385ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38986 req_id = ef10c0e8-11c4-443c-9dd6-d678d50703f2 roles = RoleSet { roles: {} } uri = /metrics/producers
28882025-03-07T23:12:00.385ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38986 req_id = ef10c0e8-11c4-443c-9dd6-d678d50703f2 resource = Database result = Ok(()) uri = /metrics/producers
28892025-03-07T23:12:00.397ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
28902025-03-07T23:12:00.399ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:894 id = df3de613-ca05-4441-b586-7faa72cb7af7
28912025-03-07T23:12:00.402ZDEBGtest_unauthorized (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
28922025-03-07T23:12:00.402ZINFOtest_unauthorized (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:794 id = df3de613-ca05-4441-b586-7faa72cb7af7
28932025-03-07T23:12:00.402ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
28942025-03-07T23:12:00.403ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:894 id = df3de613-ca05-4441-b586-7faa72cb7af7
28952025-03-07T23:12:00.403ZINFOtest_unauthorized (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:799 id = df3de613-ca05-4441-b586-7faa72cb7af7 version = 0
28962025-03-07T23:12:00.403ZINFOtest_unauthorized (clickhouse-client): initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:804 id = df3de613-ca05-4441-b586-7faa72cb7af7
28972025-03-07T23:12:00.403ZDEBGtest_unauthorized (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
28982025-03-07T23:12:00.408ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = CREATE DATABASE IF NOT EXISTS oximeter
28992025-03-07T23:12:00.422ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
29002025-03-07T23:12:00.450ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29012025-03-07T23:12:00.467ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29022025-03-07T23:12:00.492ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29032025-03-07T23:12:00.504ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 126617 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38986 req_id = ef10c0e8-11c4-443c-9dd6-d678d50703f2 response_code = 503 uri = /metrics/producers
29042025-03-07T23:12:00.505ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "ef10c0e8-11c4-443c-9dd6-d678d50703f2", "content-length": "133", "date": "Fri, 07 Mar 2025 23:11:59 GMT"} })
29052025-03-07T23:12:00.506ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 203.933885ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"ef10c0e8-11c4-443c-9dd6-d678d50703f2\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:11:59 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"ef10c0e8-11c4-443c-9dd6-d678d50703f2\\" }" file = oximeter/producer/src/lib.rs:420
29062025-03-07T23:12:00.532ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29072025-03-07T23:12:00.561ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29082025-03-07T23:12:00.577ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29092025-03-07T23:12:00.596ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29102025-03-07T23:12:00.616ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29112025-03-07T23:12:00.629ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29122025-03-07T23:12:00.654ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29132025-03-07T23:12:00.666ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = f33e4288-077a-44df-abb1-92cf385c9241
29142025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = f33e4288-077a-44df-abb1-92cf385c9241 time_started = 2025-03-07 23:11:59.833236 UTC
29152025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 965.369271ms iteration = 3 status = {"collection_id":"f33e4288-077a-44df-abb1-92cf385c9241","time_done":"2025-03-07 23:12:00.224852 UTC","time_started":"2025-03-07 23:11:59.833236 UTC"}
29162025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 3 reason = Dependency
29172025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 44.911\u{b5}s iteration = 3 status = {"error":"task disabled"}
29182025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 3 reason = Dependency
29192025-03-07T23:12:00.666ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
29202025-03-07T23:12:00.666ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 28.791\u{b5}s iteration = 3 status = {"error":"no blueprint"}
29212025-03-07T23:12:00.672ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29222025-03-07T23:12:00.685ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29232025-03-07T23:12:00.698ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29242025-03-07T23:12:00.749ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:43523/metrics/producers
29252025-03-07T23:12:00.749ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29262025-03-07T23:12:00.750ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38988
29272025-03-07T23:12:00.753ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38988 req_id = 480454cc-84c3-4d8d-876c-91f0ca7a41bb uri = /metrics/producers
29282025-03-07T23:12:00.755ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38988 req_id = 480454cc-84c3-4d8d-876c-91f0ca7a41bb resource = Database uri = /metrics/producers
29292025-03-07T23:12:00.755ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38988 req_id = 480454cc-84c3-4d8d-876c-91f0ca7a41bb roles = RoleSet { roles: {} } uri = /metrics/producers
29302025-03-07T23:12:00.755ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38988 req_id = 480454cc-84c3-4d8d-876c-91f0ca7a41bb resource = Database result = Ok(()) uri = /metrics/producers
29312025-03-07T23:12:00.762ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 11981 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38988 req_id = 480454cc-84c3-4d8d-876c-91f0ca7a41bb response_code = 503 uri = /metrics/producers
29322025-03-07T23:12:00.763ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "480454cc-84c3-4d8d-876c-91f0ca7a41bb", "content-length": "133", "date": "Fri, 07 Mar 2025 23:12:00 GMT"} })
29332025-03-07T23:12:00.764ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 744.505074ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"480454cc-84c3-4d8d-876c-91f0ca7a41bb\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:12:00 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"480454cc-84c3-4d8d-876c-91f0ca7a41bb\\" }" file = oximeter/producer/src/lib.rs:420
29342025-03-07T23:12:00.774ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29352025-03-07T23:12:00.801ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29362025-03-07T23:12:00.815ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29372025-03-07T23:12:00.828ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29382025-03-07T23:12:00.841ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29392025-03-07T23:12:00.856ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29402025-03-07T23:12:00.866ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29412025-03-07T23:12:00.890ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29422025-03-07T23:12:00.905ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29432025-03-07T23:12:00.927ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29442025-03-07T23:12:00.943ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29452025-03-07T23:12:00.958ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29462025-03-07T23:12:00.974ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29472025-03-07T23:12:00.991ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29482025-03-07T23:12:01.013ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29492025-03-07T23:12:01.029ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29502025-03-07T23:12:01.041ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29512025-03-07T23:12:01.053ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29522025-03-07T23:12:01.074ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29532025-03-07T23:12:01.091ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29542025-03-07T23:12:01.105ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29552025-03-07T23:12:01.121ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29562025-03-07T23:12:01.138ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29572025-03-07T23:12:01.154ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29582025-03-07T23:12:01.170ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29592025-03-07T23:12:01.196ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
29602025-03-07T23:12:01.212ZINFOtest_unauthorized (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:825 id = df3de613-ca05-4441-b586-7faa72cb7af7 version = 14
29612025-03-07T23:12:01.212ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = INSERT INTO oximeter.version (*) VALUES (14, now());
29622025-03-07T23:12:01.216ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = f0207013-6f22-47e9-8784-c107eccdd766
29632025-03-07T23:12:01.217ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:40697 method = GET path = /info versions = all
29642025-03-07T23:12:01.217ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:40697 method = GET path = /producers versions = all
29652025-03-07T23:12:01.217ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:40697 method = DELETE path = /producers/{producer_id} versions = all
29662025-03-07T23:12:01.217ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:40697 method = GET path = /producers/{producer_id} versions = all
29672025-03-07T23:12:01.217ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:328 local_addr = [::1]:40697
29682025-03-07T23:12:01.217ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:40697
29692025-03-07T23:12:01.217ZDEBGtest_unauthorized (oximeter): registered USDT probes
29702025-03-07T23:12:01.217ZDEBGtest_unauthorized (oximeter): contacting nexus
29712025-03-07T23:12:01.513ZDEBGtest_unauthorized (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:43523/metrics/collectors
29722025-03-07T23:12:01.553ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:43523/metrics/producers
29732025-03-07T23:12:01.554ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38990
29742025-03-07T23:12:01.554ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38992
29752025-03-07T23:12:01.555ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38992 req_id = dfb88c73-397a-478c-a85e-87939cde2648 uri = /metrics/producers
29762025-03-07T23:12:01.555ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38992 req_id = dfb88c73-397a-478c-a85e-87939cde2648 resource = Database uri = /metrics/producers
29772025-03-07T23:12:01.555ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38992 req_id = dfb88c73-397a-478c-a85e-87939cde2648 roles = RoleSet { roles: {} } uri = /metrics/producers
29782025-03-07T23:12:01.556ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38992 req_id = dfb88c73-397a-478c-a85e-87939cde2648 resource = Database result = Ok(()) uri = /metrics/producers
29792025-03-07T23:12:01.558ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38990 req_id = dbee7010-7a63-4957-adcf-8f6c98f62a80 uri = /metrics/collectors
29802025-03-07T23:12:01.558ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38990 req_id = dbee7010-7a63-4957-adcf-8f6c98f62a80 resource = Database uri = /metrics/collectors
29812025-03-07T23:12:01.558ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38990 req_id = dbee7010-7a63-4957-adcf-8f6c98f62a80 roles = RoleSet { roles: {} } uri = /metrics/collectors
29822025-03-07T23:12:01.558ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38990 req_id = dbee7010-7a63-4957-adcf-8f6c98f62a80 resource = Database result = Ok(()) uri = /metrics/collectors
29832025-03-07T23:12:01.563ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 8328 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38992 req_id = dfb88c73-397a-478c-a85e-87939cde2648 response_code = 503 uri = /metrics/producers
29842025-03-07T23:12:01.573ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "dfb88c73-397a-478c-a85e-87939cde2648", "content-length": "133", "date": "Fri, 07 Mar 2025 23:12:00 GMT"} })
29852025-03-07T23:12:01.573ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 1.258628713s error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"dfb88c73-397a-478c-a85e-87939cde2648\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:12:00 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"dfb88c73-397a-478c-a85e-87939cde2648\\" }" file = oximeter/producer/src/lib.rs:420
29862025-03-07T23:12:01.573ZINFOtest_unauthorized (nexus): registered new oximeter metric collection server address = [::1]:40697 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
29872025-03-07T23:12:01.573ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11709 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38990 req_id = dbee7010-7a63-4957-adcf-8f6c98f62a80 response_code = 204 uri = /metrics/collectors
29882025-03-07T23:12:01.573ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors", status: 204, headers: {"x-request-id": "dbee7010-7a63-4957-adcf-8f6c98f62a80", "date": "Fri, 07 Mar 2025 23:12:00 GMT"} })
29892025-03-07T23:12:01.573ZINFOtest_unauthorized (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:392 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
29902025-03-07T23:12:01.573ZDEBGtest_unauthorized (init_with_steps): Running step start_producer_server
29912025-03-07T23:12:01.573ZDEBGtest_unauthorized: Starting test metric Producer Server
29922025-03-07T23:12:01.573ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29932025-03-07T23:12:01.573ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29942025-03-07T23:12:01.573ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29952025-03-07T23:12:01.573ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29962025-03-07T23:12:01.574ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29972025-03-07T23:12:01.576ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29982025-03-07T23:12:01.576ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
29992025-03-07T23:12:01.576ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30002025-03-07T23:12:01.576ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:39323 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30012025-03-07T23:12:01.576ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:39323 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30022025-03-07T23:12:01.576ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:39323 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30032025-03-07T23:12:01.577ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:39323 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30042025-03-07T23:12:01.577ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = 147d9032-15e5-44f4-bf51-ffb657cd4adf serial = totally-unique-serial: 147d9032-15e5-44f4-bf51-ffb657cd4adf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
30052025-03-07T23:12:01.577ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30062025-03-07T23:12:01.577ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30072025-03-07T23:12:01.577ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30082025-03-07T23:12:01.577ZINFOtest_unauthorized (oximeter-agent): starting refresh list task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:559
30092025-03-07T23:12:01.624ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38994
30102025-03-07T23:12:01.625ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
30112025-03-07T23:12:01.626ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30122025-03-07T23:12:01.626ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38994 req_id = 87be9dcd-202b-471b-b288-d62aca9caea7 uri = /metrics/producers
30132025-03-07T23:12:01.627ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4dfc792d-7605-4f82-9237-5f8ed70883b4 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30142025-03-07T23:12:01.627ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38994 req_id = 87be9dcd-202b-471b-b288-d62aca9caea7 resource = Database uri = /metrics/producers
30152025-03-07T23:12:01.627ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38994 req_id = 87be9dcd-202b-471b-b288-d62aca9caea7 roles = RoleSet { roles: {} } uri = /metrics/producers
30162025-03-07T23:12:01.628ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38994 req_id = 87be9dcd-202b-471b-b288-d62aca9caea7 resource = Database result = Ok(()) uri = /metrics/producers
30172025-03-07T23:12:01.628ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4dfc792d-7605-4f82-9237-5f8ed70883b4 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30182025-03-07T23:12:01.629ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4dfc792d-7605-4f82-9237-5f8ed70883b4 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30192025-03-07T23:12:01.629ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4dfc792d-7605-4f82-9237-5f8ed70883b4 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30202025-03-07T23:12:01.672ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 45153 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4dfc792d-7605-4f82-9237-5f8ed70883b4 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30212025-03-07T23:12:01.672ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "4dfc792d-7605-4f82-9237-5f8ed70883b4", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:00 GMT"} })
30222025-03-07T23:12:01.673ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 0 n_pruned_tasks = 0
30232025-03-07T23:12:01.677ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30242025-03-07T23:12:01.677ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30252025-03-07T23:12:01.677ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30262025-03-07T23:12:01.678ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
30272025-03-07T23:12:01.680ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30282025-03-07T23:12:01.680ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30292025-03-07T23:12:01.680ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30302025-03-07T23:12:01.680ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30312025-03-07T23:12:01.686ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30322025-03-07T23:12:01.686ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
30332025-03-07T23:12:01.724ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
30342025-03-07T23:12:01.725ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 95635 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38994 req_id = 87be9dcd-202b-471b-b288-d62aca9caea7 response_code = 201 uri = /metrics/producers
30352025-03-07T23:12:01.950ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = 147d9032-15e5-44f4-bf51-ffb657cd4adf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 15974051-fd8d-4f83-9273-5c6e7019b38e
30362025-03-07T23:12:01.950ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30372025-03-07T23:12:01.950ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30382025-03-07T23:12:01.950ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30392025-03-07T23:12:01.952ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
30402025-03-07T23:12:01.952ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30412025-03-07T23:12:01.952ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30422025-03-07T23:12:01.952ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30432025-03-07T23:12:01.953ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30442025-03-07T23:12:01.956ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30452025-03-07T23:12:01.958ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
30462025-03-07T23:12:01.989ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = 43459067-35ee-4799-a90e-62fe47e85e2d zpool_id = 15974051-fd8d-4f83-9273-5c6e7019b38e
30472025-03-07T23:12:02.107ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
30482025-03-07T23:12:02.107ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30492025-03-07T23:12:02.109ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30502025-03-07T23:12:02.110ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30512025-03-07T23:12:02.110ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30522025-03-07T23:12:02.111ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 4 reason = Signaled
30532025-03-07T23:12:02.111ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
30542025-03-07T23:12:02.111ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30552025-03-07T23:12:02.111ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
30562025-03-07T23:12:02.111ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
30572025-03-07T23:12:02.111ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
30582025-03-07T23:12:02.120ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30592025-03-07T23:12:02.125ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
30602025-03-07T23:12:02.126ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30612025-03-07T23:12:02.126ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30622025-03-07T23:12:02.126ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30632025-03-07T23:12:02.126ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30642025-03-07T23:12:02.130ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
30652025-03-07T23:12:02.137ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
30662025-03-07T23:12:02.137ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
30672025-03-07T23:12:02.140ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
30682025-03-07T23:12:02.163ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30692025-03-07T23:12:02.163ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30702025-03-07T23:12:02.164ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30712025-03-07T23:12:02.165ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(ee68d9db-a598-40b9-abec-64d117a8e69d, 0), (f33e4288-077a-44df-abb1-92cf385c9241, 0)]
30722025-03-07T23:12:02.165ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
30732025-03-07T23:12:02.170ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 72 0b 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 r............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:60749 req_id = c73c6710-f66c-419a-a0b9-1c456cb720e8
30742025-03-07T23:12:02.171ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29195,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60749 req_id = c73c6710-f66c-419a-a0b9-1c456cb720e8
30752025-03-07T23:12:02.171ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
30762025-03-07T23:12:02.171ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
30772025-03-07T23:12:02.171ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:60749 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = c73c6710-f66c-419a-a0b9-1c456cb720e8
30782025-03-07T23:12:02.171ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2806, tv_nsec: 948448033 } })
30792025-03-07T23:12:02.171ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
30802025-03-07T23:12:02.171ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: cf 22 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ."..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:64890 req_id = 2ba2a5ff-a0bf-46dd-a931-fc9fb097155a
30812025-03-07T23:12:02.172ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 53026,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64890 req_id = 2ba2a5ff-a0bf-46dd-a931-fc9fb097155a
30822025-03-07T23:12:02.172ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
30832025-03-07T23:12:02.172ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:64890 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 2ba2a5ff-a0bf-46dd-a931-fc9fb097155a
30842025-03-07T23:12:02.296ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
30852025-03-07T23:12:02.323ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
30862025-03-07T23:12:02.325ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
30872025-03-07T23:12:02.329ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 04 ca 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:59826 req_id = 433e3d82-d30e-4664-b31f-e09b6579b19e
30882025-03-07T23:12:02.330ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 1226,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59826 req_id = 433e3d82-d30e-4664-b31f-e09b6579b19e
30892025-03-07T23:12:02.330ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
30902025-03-07T23:12:02.330ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 1226, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:59826 req_id = 433e3d82-d30e-4664-b31f-e09b6579b19e
30912025-03-07T23:12:02.330ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
30922025-03-07T23:12:02.330ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
30932025-03-07T23:12:02.330ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
30942025-03-07T23:12:02.330ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 1e 1a 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:55922 req_id = 81b89d15-ba52-459d-95ed-c94234fc8e1e
30952025-03-07T23:12:02.334ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 7706,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55922 req_id = 81b89d15-ba52-459d-95ed-c94234fc8e1e
30962025-03-07T23:12:02.335ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
30972025-03-07T23:12:02.335ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
30982025-03-07T23:12:02.338ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:55922 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = 81b89d15-ba52-459d-95ed-c94234fc8e1e
30992025-03-07T23:12:02.344ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: c1 52 01 00 00 01 00 00 00 00 00 01 24 30 65 36 .R..........$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:60277 req_id = 0b0dd99a-2013-4a70-b534-58346eb321a5
31002025-03-07T23:12:02.345ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49490,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60277 req_id = 0b0dd99a-2013-4a70-b534-58346eb321a5
31012025-03-07T23:12:02.345ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
31022025-03-07T23:12:02.346ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60277 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 0b0dd99a-2013-4a70-b534-58346eb321a5
31032025-03-07T23:12:02.481ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54056 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31042025-03-07T23:12:02.481ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "720caa61-60bf-4369-bcbe-13fa1fb5a028", "content-length": "835", "date": "Fri, 07 Mar 2025 23:12:02 GMT"} })
31052025-03-07T23:12:02.482ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
31062025-03-07T23:12:02.483ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 414ab17b-dad9-40d1-9297-f18b70006a64 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31072025-03-07T23:12:02.483ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 588 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 414ab17b-dad9-40d1-9297-f18b70006a64 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31082025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54058 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31092025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54060 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31102025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54062 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31112025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54064 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31122025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54066 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31132025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54068 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31142025-03-07T23:12:03.387ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54070 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31152025-03-07T23:12:03.462ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:43523/metrics/producers
31162025-03-07T23:12:03.479ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
31172025-03-07T23:12:03.479ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
31182025-03-07T23:12:03.480ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54058 req_id = 600251fa-f5b9-4d06-a74d-5e9bf00ecf2c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31192025-03-07T23:12:03.481ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54060 req_id = 611414e1-4a53-4cd6-8071-e0bef513d602 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31202025-03-07T23:12:03.481ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54062 req_id = 22c26f01-d346-4b87-8696-b102424ed28a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31212025-03-07T23:12:03.481ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54064 req_id = 6b0be7ce-8142-4f80-a64e-edd4eca3b702 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31222025-03-07T23:12:03.481ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54066 req_id = 379e8ee4-f367-486b-95f6-b2bba56d9474 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31232025-03-07T23:12:03.482ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54068 req_id = dd7a8c02-9879-4c5c-986d-67b100a99726 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31242025-03-07T23:12:03.482ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54070 req_id = 9a687a62-42d9-40d1-a275-f69689f76d8c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31252025-03-07T23:12:03.483ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:43523 remote_addr = 127.0.0.1:38996
31262025-03-07T23:12:03.485ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 3367 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54058 req_id = 600251fa-f5b9-4d06-a74d-5e9bf00ecf2c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31272025-03-07T23:12:03.485ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 3179 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54060 req_id = 611414e1-4a53-4cd6-8071-e0bef513d602 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31282025-03-07T23:12:03.485ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 3006 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54062 req_id = 22c26f01-d346-4b87-8696-b102424ed28a response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31292025-03-07T23:12:03.485ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2824 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54064 req_id = 6b0be7ce-8142-4f80-a64e-edd4eca3b702 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31302025-03-07T23:12:03.485ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2665 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54066 req_id = 379e8ee4-f367-486b-95f6-b2bba56d9474 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31312025-03-07T23:12:03.486ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2496 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54068 req_id = dd7a8c02-9879-4c5c-986d-67b100a99726 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31322025-03-07T23:12:03.486ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2305 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54070 req_id = 9a687a62-42d9-40d1-a275-f69689f76d8c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
31332025-03-07T23:12:03.486ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38996 req_id = 9163390a-d51f-4ec0-bc60-f463748c7d6f uri = /metrics/producers
31342025-03-07T23:12:03.486ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38996 req_id = 9163390a-d51f-4ec0-bc60-f463748c7d6f resource = Database uri = /metrics/producers
31352025-03-07T23:12:03.487ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38996 req_id = 9163390a-d51f-4ec0-bc60-f463748c7d6f roles = RoleSet { roles: {} } uri = /metrics/producers
31362025-03-07T23:12:03.487ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38996 req_id = 9163390a-d51f-4ec0-bc60-f463748c7d6f resource = Database result = Ok(()) uri = /metrics/producers
31372025-03-07T23:12:03.493ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "57b111f3-1bcc-4b79-a24e-8bb8e4897ebb", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31382025-03-07T23:12:03.496ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
31392025-03-07T23:12:03.521ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d45f2ab-afd4-4367-b5ad-7ba78c520b20", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31402025-03-07T23:12:03.522ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
31412025-03-07T23:12:03.522ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
31422025-03-07T23:12:03.522ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 37860 local_addr = 127.0.0.1:43523 method = POST remote_addr = 127.0.0.1:38996 req_id = 9163390a-d51f-4ec0-bc60-f463748c7d6f response_code = 201 uri = /metrics/producers
31432025-03-07T23:12:03.524ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "9163390a-d51f-4ec0-bc60-f463748c7d6f", "content-length": "41", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31442025-03-07T23:12:03.525ZDEBGtest_unauthorized (producer-registration-task): registered with nexus successfully
31452025-03-07T23:12:03.526ZDEBGtest_unauthorized (producer-registration-task): pausing until time to renew lease lease_duration = 600s wait_period = 150s
31462025-03-07T23:12:03.529ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c5f34639-e5e5-4eb7-ad18-c5c6bb970cf0", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31472025-03-07T23:12:03.529ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
31482025-03-07T23:12:03.532ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd87c4fd-90f6-4b65-837e-986d17b58ee8", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31492025-03-07T23:12:03.533ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
31502025-03-07T23:12:03.536ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6336df56-02f4-4f56-8dc1-532e31c51216", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31512025-03-07T23:12:03.536ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
31522025-03-07T23:12:03.538ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4827db2-5c14-46c4-8c2d-5c9600c70411", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31532025-03-07T23:12:03.539ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
31542025-03-07T23:12:03.545ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a91c0990-706d-4833-827d-899322efe50c", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31552025-03-07T23:12:03.545ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
31562025-03-07T23:12:03.548ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f4840808-d001-456d-8615-885df2b76d4a", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31572025-03-07T23:12:03.548ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
31582025-03-07T23:12:03.548ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aed6b188-d06a-4256-8b82-14bd9d497397", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31592025-03-07T23:12:03.548ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
31602025-03-07T23:12:03.549ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f41c8473-3d02-4cf9-a48e-8154ab5f0fe3", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31612025-03-07T23:12:03.549ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
31622025-03-07T23:12:03.550ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "18571b80-5c5b-4aba-af02-ad9774e7cb9d", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31632025-03-07T23:12:03.550ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
31642025-03-07T23:12:03.551ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9f5c8f4-8c17-44e3-b638-72181df3a2ed", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31652025-03-07T23:12:03.552ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
31662025-03-07T23:12:03.553ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4490b6f-7ac6-4801-8168-8202ff6ee49b", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31672025-03-07T23:12:03.554ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
31682025-03-07T23:12:03.557ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1be0f84-0ba9-400a-af3c-9da7b72f8885", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31692025-03-07T23:12:03.557ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
31702025-03-07T23:12:03.560ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc82af74-20e2-4a29-892a-d98cab943740", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31712025-03-07T23:12:03.563ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
31722025-03-07T23:12:03.563ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ddf7fa9-f8aa-445b-a33b-ebae1fcd338c", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31732025-03-07T23:12:03.564ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
31742025-03-07T23:12:03.565ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "eae419e8-72ca-4625-af0d-df2955ea4c56", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31752025-03-07T23:12:03.565ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
31762025-03-07T23:12:03.565ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "56edbd67-b19c-41ea-84fb-c79b74ebfb79", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31772025-03-07T23:12:03.565ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
31782025-03-07T23:12:03.566ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed39920f-ed1f-435b-aec1-e5dd9e63ea79", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31792025-03-07T23:12:03.567ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
31802025-03-07T23:12:03.567ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e1b7686-14c3-4ef3-a55f-4f7c2a332a87", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31812025-03-07T23:12:03.568ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
31822025-03-07T23:12:03.568ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9c14e40c-8daa-48a6-86ab-7f51442f69e9", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31832025-03-07T23:12:03.568ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
31842025-03-07T23:12:03.568ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "726673dc-c5a8-447f-8395-27ba30f8ce35", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31852025-03-07T23:12:03.570ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
31862025-03-07T23:12:03.570ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3667b9ae-6f67-446b-9b93-02597daf2f68", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31872025-03-07T23:12:03.570ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
31882025-03-07T23:12:03.571ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1fbdff5-e2b4-48c6-83ab-eb5e06a0da85", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31892025-03-07T23:12:03.572ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
31902025-03-07T23:12:03.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
31912025-03-07T23:12:03.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31922025-03-07T23:12:03.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f6d18830-77b2-41b9-a1fd-ecb930a8cdeb uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31932025-03-07T23:12:03.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f6d18830-77b2-41b9-a1fd-ecb930a8cdeb resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31942025-03-07T23:12:03.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f6d18830-77b2-41b9-a1fd-ecb930a8cdeb roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31952025-03-07T23:12:03.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f6d18830-77b2-41b9-a1fd-ecb930a8cdeb resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31962025-03-07T23:12:03.578ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "54e0b38d-f603-4bb3-bfb7-39550e2d52d5", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
31972025-03-07T23:12:03.578ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
31982025-03-07T23:12:03.579ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5872 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f6d18830-77b2-41b9-a1fd-ecb930a8cdeb response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
31992025-03-07T23:12:03.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "f6d18830-77b2-41b9-a1fd-ecb930a8cdeb", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32002025-03-07T23:12:03.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32012025-03-07T23:12:03.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f86a0165-9938-47f9-be43-8def8f90a230 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32022025-03-07T23:12:03.581ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f86a0165-9938-47f9-be43-8def8f90a230 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32032025-03-07T23:12:03.582ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f86a0165-9938-47f9-be43-8def8f90a230 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32042025-03-07T23:12:03.582ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f86a0165-9938-47f9-be43-8def8f90a230 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32052025-03-07T23:12:03.584ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "af312c1c-89f6-4647-92b9-78f8c102398d", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32062025-03-07T23:12:03.584ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
32072025-03-07T23:12:03.586ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4523 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f86a0165-9938-47f9-be43-8def8f90a230 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
32082025-03-07T23:12:03.586ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "f86a0165-9938-47f9-be43-8def8f90a230", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32092025-03-07T23:12:03.587ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = [::1]:38393 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
32102025-03-07T23:12:03.626ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
32112025-03-07T23:12:03.628ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = 127.0.0.1:35155 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
32122025-03-07T23:12:03.731ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
32132025-03-07T23:12:03.733ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
32142025-03-07T23:12:03.734ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1104433e-aa0c-442f-84a0-bc4b8dc93080", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32152025-03-07T23:12:03.735ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
32162025-03-07T23:12:03.746ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a21c15ca-b393-40ef-adfb-f4bf1d80e729", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32172025-03-07T23:12:03.747ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
32182025-03-07T23:12:03.751ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6901d09b-bab8-4a91-aa24-6e505c761786", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32192025-03-07T23:12:03.752ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
32202025-03-07T23:12:03.753ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7df75d87-4ae6-4e6c-8f8e-f218802de4f6", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32212025-03-07T23:12:03.754ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
32222025-03-07T23:12:03.757ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d49d1586-a228-42c7-9bf2-91e2fedc765f", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32232025-03-07T23:12:03.758ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
32242025-03-07T23:12:03.764ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
32252025-03-07T23:12:03.769ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e053b1d-7366-408e-a9a4-c5b0dbbfc26e", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32262025-03-07T23:12:03.769ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
32272025-03-07T23:12:03.785ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb4f9698-d4cd-44be-b5a9-b028cd2e2288", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32282025-03-07T23:12:03.786ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
32292025-03-07T23:12:03.807ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "31dd9c1d-f780-49a2-96f3-693098f541d3", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32302025-03-07T23:12:03.807ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
32312025-03-07T23:12:03.816ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
32322025-03-07T23:12:03.816ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32332025-03-07T23:12:03.816ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32342025-03-07T23:12:03.817ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32352025-03-07T23:12:03.817ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32362025-03-07T23:12:03.823ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b3c9bc5-ddb4-4ccf-bed3-8c99311d7fa1", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32372025-03-07T23:12:03.823ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
32382025-03-07T23:12:03.825ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32392025-03-07T23:12:03.831ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
32402025-03-07T23:12:03.831ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32412025-03-07T23:12:03.831ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32422025-03-07T23:12:03.832ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32432025-03-07T23:12:03.834ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7dc052f-de49-437c-93b5-eada81636fe4", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32442025-03-07T23:12:03.834ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
32452025-03-07T23:12:03.835ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32462025-03-07T23:12:03.836ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32472025-03-07T23:12:03.837ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32482025-03-07T23:12:03.843ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3c42950-6bba-48d0-a1e4-5bb0ff8c1476", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32492025-03-07T23:12:03.843ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
32502025-03-07T23:12:03.846ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0046434-98a6-4dd2-b4b7-ce6d2a4975d4", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32512025-03-07T23:12:03.850ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
32522025-03-07T23:12:03.854ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f24a7efe-bd8e-49bb-96a5-40481dd06a71", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32532025-03-07T23:12:03.855ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
32542025-03-07T23:12:03.859ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "791e49bc-a1e0-4c3a-acdc-ce41f575f5c6", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32552025-03-07T23:12:03.859ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
32562025-03-07T23:12:03.861ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1a14e630-9abc-45ac-a1ef-2a6c72a83089", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32572025-03-07T23:12:03.861ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
32582025-03-07T23:12:03.862ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ccaeff9-eba9-45f7-bdaa-5ad3d23bc0dd", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32592025-03-07T23:12:03.863ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
32602025-03-07T23:12:03.864ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8797d414-04a6-43a6-b585-ac15ccece6ce", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32612025-03-07T23:12:03.865ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
32622025-03-07T23:12:03.866ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d216dee0-4f74-4af8-b3ad-476336fcc89e", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32632025-03-07T23:12:03.866ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
32642025-03-07T23:12:03.866ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32652025-03-07T23:12:03.867ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32662025-03-07T23:12:03.867ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32672025-03-07T23:12:03.867ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32682025-03-07T23:12:03.874ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32692025-03-07T23:12:03.879ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
32702025-03-07T23:12:03.880ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
32712025-03-07T23:12:03.880ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32722025-03-07T23:12:03.880ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32732025-03-07T23:12:03.880ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32742025-03-07T23:12:03.883ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32752025-03-07T23:12:03.887ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32762025-03-07T23:12:03.898ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
32772025-03-07T23:12:03.898ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32782025-03-07T23:12:03.898ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32792025-03-07T23:12:03.900ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32802025-03-07T23:12:03.989ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
32812025-03-07T23:12:03.990ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
32822025-03-07T23:12:03.990ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34792 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32832025-03-07T23:12:03.991ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34792 req_id = 17d01a8c-2f00-41fe-8ad2-212e1df489de sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
32842025-03-07T23:12:03.992ZINFOtest_unauthorized (dropshot): request completed latency_us = 811 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34792 req_id = 17d01a8c-2f00-41fe-8ad2-212e1df489de response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
32852025-03-07T23:12:03.993ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "17d01a8c-2f00-41fe-8ad2-212e1df489de", "content-length": "3141", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
32862025-03-07T23:12:03.996ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
32872025-03-07T23:12:03.997ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
32882025-03-07T23:12:03.997ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
32892025-03-07T23:12:03.998ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
32902025-03-07T23:12:03.999ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32912025-03-07T23:12:03.999ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32922025-03-07T23:12:03.999ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32932025-03-07T23:12:04.001ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32942025-03-07T23:12:04.007ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32952025-03-07T23:12:04.015ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
32962025-03-07T23:12:04.016ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32972025-03-07T23:12:04.016ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32982025-03-07T23:12:04.036ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32992025-03-07T23:12:04.059ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
33002025-03-07T23:12:04.110ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
33012025-03-07T23:12:04.111ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
33022025-03-07T23:12:04.111ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33032025-03-07T23:12:04.111ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33042025-03-07T23:12:04.112ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33052025-03-07T23:12:04.121ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
33062025-03-07T23:12:04.129ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
33072025-03-07T23:12:04.129ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33082025-03-07T23:12:04.129ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33092025-03-07T23:12:04.129ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33102025-03-07T23:12:04.218ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
33112025-03-07T23:12:04.218ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
33122025-03-07T23:12:04.302ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 3c78ec8d-7908-47f4-b23f-a2eeff11961c
33132025-03-07T23:12:04.302ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 3c78ec8d-7908-47f4-b23f-a2eeff11961c time_started = 2025-03-07 23:12:02.329938 UTC
33142025-03-07T23:12:04.302ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.194351662s iteration = 4 status = {"collection_id":"3c78ec8d-7908-47f4-b23f-a2eeff11961c","time_done":"2025-03-07 23:12:03.996309 UTC","time_started":"2025-03-07 23:12:02.329938 UTC"}
33152025-03-07T23:12:04.307ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 5 reason = Signaled
33162025-03-07T23:12:04.308ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
33172025-03-07T23:12:04.308ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
33182025-03-07T23:12:04.308ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
33192025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
33202025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
33212025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 4 reason = Dependency
33222025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 65.271\u{b5}s iteration = 4 status = {"error":"task disabled"}
33232025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 4 reason = Dependency
33242025-03-07T23:12:04.308ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
33252025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 22.38\u{b5}s iteration = 4 status = {"error":"no blueprint"}
33262025-03-07T23:12:04.308ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
33272025-03-07T23:12:04.313ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
33282025-03-07T23:12:04.313ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
33292025-03-07T23:12:04.313ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
33302025-03-07T23:12:04.320ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
33312025-03-07T23:12:04.324ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(ee68d9db-a598-40b9-abec-64d117a8e69d, 0), (f33e4288-077a-44df-abb1-92cf385c9241, 0), (3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0)]
33322025-03-07T23:12:04.325ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
33332025-03-07T23:12:04.325ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 1f 7f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:53300 req_id = 816c1734-b008-4094-acee-fb4a782f662a
33342025-03-07T23:12:04.325ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 8063,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53300 req_id = 816c1734-b008-4094-acee-fb4a782f662a
33352025-03-07T23:12:04.326ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
33362025-03-07T23:12:04.326ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
33372025-03-07T23:12:04.326ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:53300 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 816c1734-b008-4094-acee-fb4a782f662a
33382025-03-07T23:12:04.327ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2809, tv_nsec: 103496104 } })
33392025-03-07T23:12:04.327ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
33402025-03-07T23:12:04.328ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33412025-03-07T23:12:04.328ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33422025-03-07T23:12:04.329ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33432025-03-07T23:12:04.354ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: ac e0 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:59205 req_id = 64e1c3d9-33fc-4c8d-ba19-eca2a9e04f63
33442025-03-07T23:12:04.354ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 44256,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59205 req_id = 64e1c3d9-33fc-4c8d-ba19-eca2a9e04f63
33452025-03-07T23:12:04.354ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
33462025-03-07T23:12:04.354ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:59205 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 64e1c3d9-33fc-4c8d-ba19-eca2a9e04f63
33472025-03-07T23:12:04.416ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
33482025-03-07T23:12:04.417ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: b8 24 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c .$..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:65023 req_id = 70088499-af59-48dd-9a74-b41d1d62407b
33492025-03-07T23:12:04.417ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 47140,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65023 req_id = 70088499-af59-48dd-9a74-b41d1d62407b
33502025-03-07T23:12:04.417ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
33512025-03-07T23:12:04.417ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 47140, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:65023 req_id = 70088499-af59-48dd-9a74-b41d1d62407b
33522025-03-07T23:12:04.418ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
33532025-03-07T23:12:04.418ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
33542025-03-07T23:12:04.418ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
33552025-03-07T23:12:04.420ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "4ac45071-1c6a-4ea0-8e47-dcb760fdaf68", "content-length": "835", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33562025-03-07T23:12:04.422ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
33572025-03-07T23:12:04.422ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "dec53831-6168-4ab3-9834-dc370774d782", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33582025-03-07T23:12:04.422ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
33592025-03-07T23:12:04.427ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "514812ea-87ce-43d9-af89-3dd942698bef", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33602025-03-07T23:12:04.427ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
33612025-03-07T23:12:04.429ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e3587b31-7991-4a20-be24-956f4847513e", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33622025-03-07T23:12:04.430ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
33632025-03-07T23:12:04.431ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "11e23a23-de43-469f-bbcc-cd4765714143", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33642025-03-07T23:12:04.431ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
33652025-03-07T23:12:04.433ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1909a8b-5cca-4d0f-b672-3090b11da290", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33662025-03-07T23:12:04.433ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
33672025-03-07T23:12:04.435ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a1bbcbb8-bb55-49c3-b317-d7e3e287a6b4", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33682025-03-07T23:12:04.435ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
33692025-03-07T23:12:04.437ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cff062f1-48eb-4e63-93f9-1e5cb9afb22a", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33702025-03-07T23:12:04.437ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
33712025-03-07T23:12:04.438ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc9adb06-dc3b-4647-b2fc-6aadffabf1bb", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33722025-03-07T23:12:04.439ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
33732025-03-07T23:12:04.440ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4faa51a5-fed5-4917-aa43-dd5f44b815cd", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33742025-03-07T23:12:04.440ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
33752025-03-07T23:12:04.441ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed680543-c32a-4013-8b0c-46333dcd0062", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33762025-03-07T23:12:04.441ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
33772025-03-07T23:12:04.442ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8306d86f-45a2-4d5a-b949-30dc1fcad9b8", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33782025-03-07T23:12:04.442ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
33792025-03-07T23:12:04.444ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f8bda9a6-5d2a-4ed3-a240-0805be69a85a", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33802025-03-07T23:12:04.444ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
33812025-03-07T23:12:04.446ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8de41046-0a01-4f1c-9936-1fa1b667d8c6", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33822025-03-07T23:12:04.446ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
33832025-03-07T23:12:04.448ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ecc4c53-bfe8-42d5-8685-7d9ea48984de", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33842025-03-07T23:12:04.448ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
33852025-03-07T23:12:04.450ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8eac3e39-ea7b-4aab-95ac-a6403a1de3a7", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
33862025-03-07T23:12:04.450ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
33872025-03-07T23:12:04.452ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
33882025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33892025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33902025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33912025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33922025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33932025-03-07T23:12:04.453ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33942025-03-07T23:12:04.454ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33952025-03-07T23:12:04.454ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33962025-03-07T23:12:04.454ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36409 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33972025-03-07T23:12:04.454ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:36409 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
33982025-03-07T23:12:04.454ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:36409 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
33992025-03-07T23:12:04.454ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:36409 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
34002025-03-07T23:12:04.454ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = 5219f008-b1da-4347-bbb6-f720514de590 serial = totally-unique-serial: 5219f008-b1da-4347-bbb6-f720514de590 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
34012025-03-07T23:12:04.454ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
34022025-03-07T23:12:04.455ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
34032025-03-07T23:12:04.455ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
34042025-03-07T23:12:04.456ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "aad78109-60fc-420f-a03b-9f716d97a949", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34052025-03-07T23:12:04.457ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
34062025-03-07T23:12:04.458ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c1001b25-be0b-4907-baad-22ccb707af21", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34072025-03-07T23:12:04.459ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
34082025-03-07T23:12:04.460ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
34092025-03-07T23:12:04.460ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
34102025-03-07T23:12:04.461ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
34112025-03-07T23:12:04.461ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f6442ad-2ffe-455a-ba6b-6171318e1397", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34122025-03-07T23:12:04.462ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
34132025-03-07T23:12:04.463ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
34142025-03-07T23:12:04.463ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34152025-03-07T23:12:04.463ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
34162025-03-07T23:12:04.463ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
34172025-03-07T23:12:04.464ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
34182025-03-07T23:12:04.464ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "df183eba-3557-4e22-bd72-8353a48cfee3", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34192025-03-07T23:12:04.464ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
34202025-03-07T23:12:04.466ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "258d8c19-24d5-438d-bd29-1d271e8b6d81", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34212025-03-07T23:12:04.466ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
34222025-03-07T23:12:04.466ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34232025-03-07T23:12:04.471ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
34242025-03-07T23:12:04.472ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "446e7919-891b-4e9f-9978-2649af32e268", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34252025-03-07T23:12:04.474ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
34262025-03-07T23:12:04.474ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "800ebf79-703a-4738-b0f9-ada2edde29dd", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34272025-03-07T23:12:04.474ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
34282025-03-07T23:12:04.477ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f3c1e587-79e5-452b-a431-ebe3ee2cf978", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34292025-03-07T23:12:04.477ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
34302025-03-07T23:12:04.480ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8867e019-e6b4-4d6a-89fd-ea610d7ce494", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:03 GMT"} })
34312025-03-07T23:12:04.481ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
34322025-03-07T23:12:04.483ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "95bdfdae-8c8c-4d35-9862-77589cb8254c", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34332025-03-07T23:12:04.483ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
34342025-03-07T23:12:04.487ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "952f12ac-4e72-48d5-869c-09739e32ddf6", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34352025-03-07T23:12:04.487ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
34362025-03-07T23:12:04.489ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "eea4006d-8a6d-41fd-9f05-fb27e7bdf254", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34372025-03-07T23:12:04.489ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
34382025-03-07T23:12:04.494ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f3abf2d1-7e78-4500-be4d-ba67d2bd0570", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34392025-03-07T23:12:04.494ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
34402025-03-07T23:12:04.496ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "de2ecb93-76af-4303-aaae-b9dea1f1dbde", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34412025-03-07T23:12:04.496ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
34422025-03-07T23:12:04.497ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "81e2a757-0500-4e79-8783-46dca0209a1d", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34432025-03-07T23:12:04.497ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
34442025-03-07T23:12:04.498ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "89d6543a-b0cb-4bf7-bdb4-00e8e6c70d06", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34452025-03-07T23:12:04.499ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
34462025-03-07T23:12:04.499ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ffa1299-0af1-4c52-a820-de617bc50342", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34472025-03-07T23:12:04.500ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
34482025-03-07T23:12:04.501ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3d205b1a-dcfb-47e6-b411-19d949fa9f12", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34492025-03-07T23:12:04.501ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
34502025-03-07T23:12:04.502ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "81216747-bf54-4fa4-b2c4-1f84d220deda", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34512025-03-07T23:12:04.503ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
34522025-03-07T23:12:04.504ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "47d26ea1-7b7e-47ee-a352-e580d0796c5d", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34532025-03-07T23:12:04.505ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
34542025-03-07T23:12:04.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ecc1dad2-ebd1-4380-b5ff-093a9e321700", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34552025-03-07T23:12:04.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
34562025-03-07T23:12:04.509ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "71da4cfd-c0bc-4fae-b435-991de135401e", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34572025-03-07T23:12:04.509ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
34582025-03-07T23:12:04.511ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "499f126f-2314-487f-bf69-586a5195d6b5", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34592025-03-07T23:12:04.511ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
34602025-03-07T23:12:04.513ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7eda8ed4-cccb-4787-b1cf-803c8a2f8644", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34612025-03-07T23:12:04.514ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
34622025-03-07T23:12:04.516ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "eeebda6c-3aad-4100-97e7-92cd5c5e9687", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34632025-03-07T23:12:04.516ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
34642025-03-07T23:12:04.517ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "632a0bd1-475e-4963-9fd1-85f052644b4c", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34652025-03-07T23:12:04.517ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
34662025-03-07T23:12:04.518ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f4cbcb57-fa74-44aa-8d71-879b64f711db", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34672025-03-07T23:12:04.518ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
34682025-03-07T23:12:04.523ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "90975f7e-3d94-41b7-8351-6a8e9882a782", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34692025-03-07T23:12:04.524ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
34702025-03-07T23:12:04.524ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "14192839-0bf2-43f3-9bf8-9f96b615301d", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34712025-03-07T23:12:04.524ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
34722025-03-07T23:12:04.525ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34732025-03-07T23:12:04.525ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34742025-03-07T23:12:04.525ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34752025-03-07T23:12:04.526ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34762025-03-07T23:12:04.530ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34772025-03-07T23:12:04.538ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
34782025-03-07T23:12:04.538ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
34792025-03-07T23:12:04.538ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34802025-03-07T23:12:04.539ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34812025-03-07T23:12:04.539ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34822025-03-07T23:12:04.539ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34832025-03-07T23:12:04.547ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34842025-03-07T23:12:04.547ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
34852025-03-07T23:12:04.547ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34862025-03-07T23:12:04.547ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34872025-03-07T23:12:04.548ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34882025-03-07T23:12:04.624ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
34892025-03-07T23:12:04.624ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
34902025-03-07T23:12:04.625ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34794 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
34912025-03-07T23:12:04.625ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
34922025-03-07T23:12:04.625ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
34932025-03-07T23:12:04.626ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34794 req_id = 256c809d-d0a0-41c7-91e4-0964aafb3f05 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34942025-03-07T23:12:04.627ZINFOtest_unauthorized (dropshot): request completed latency_us = 890 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34794 req_id = 256c809d-d0a0-41c7-91e4-0964aafb3f05 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34952025-03-07T23:12:04.629ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "256c809d-d0a0-41c7-91e4-0964aafb3f05", "content-length": "3515", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
34962025-03-07T23:12:04.639ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34972025-03-07T23:12:04.639ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34982025-03-07T23:12:04.639ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
34992025-03-07T23:12:04.639ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
35002025-03-07T23:12:04.639ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35012025-03-07T23:12:04.639ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35022025-03-07T23:12:04.639ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35032025-03-07T23:12:04.640ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35042025-03-07T23:12:04.641ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35052025-03-07T23:12:04.642ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35062025-03-07T23:12:04.642ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35072025-03-07T23:12:04.642ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35082025-03-07T23:12:04.647ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35092025-03-07T23:12:04.652ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
35102025-03-07T23:12:04.652ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35112025-03-07T23:12:04.652ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35122025-03-07T23:12:04.653ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35132025-03-07T23:12:04.771ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = 5219f008-b1da-4347-bbb6-f720514de590 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = bba3352f-4e07-4bd1-bdf7-5f4138416688
35142025-03-07T23:12:04.771ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35152025-03-07T23:12:04.771ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35162025-03-07T23:12:04.772ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35172025-03-07T23:12:04.801ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
35182025-03-07T23:12:04.801ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35192025-03-07T23:12:04.802ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35202025-03-07T23:12:04.802ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35212025-03-07T23:12:04.820ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35222025-03-07T23:12:04.858ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35232025-03-07T23:12:04.864ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
35242025-03-07T23:12:04.887ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = 2520a1a7-480c-468a-a7fd-6a117269f106 zpool_id = bba3352f-4e07-4bd1-bdf7-5f4138416688
35252025-03-07T23:12:04.901ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
35262025-03-07T23:12:04.902ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35272025-03-07T23:12:04.902ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35282025-03-07T23:12:04.902ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35292025-03-07T23:12:04.902ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35302025-03-07T23:12:04.917ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35312025-03-07T23:12:04.933ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
35322025-03-07T23:12:04.933ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35332025-03-07T23:12:04.933ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35342025-03-07T23:12:04.934ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35352025-03-07T23:12:05.149ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 244ef5a5-92a9-4c75-8200-e6cf7512cc1f
35362025-03-07T23:12:05.149ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 244ef5a5-92a9-4c75-8200-e6cf7512cc1f time_started = 2025-03-07 23:12:04.417870 UTC
35372025-03-07T23:12:05.149ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 846.83615ms iteration = 5 status = {"collection_id":"244ef5a5-92a9-4c75-8200-e6cf7512cc1f","time_done":"2025-03-07 23:12:04.631315 UTC","time_started":"2025-03-07 23:12:04.417870 UTC"}
35382025-03-07T23:12:05.149ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 6 reason = Signaled
35392025-03-07T23:12:05.149ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
35402025-03-07T23:12:05.149ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35412025-03-07T23:12:05.150ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35422025-03-07T23:12:05.150ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35432025-03-07T23:12:05.151ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35442025-03-07T23:12:05.151ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 5 reason = Dependency
35452025-03-07T23:12:05.151ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
35462025-03-07T23:12:05.151ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 39.151\u{b5}s iteration = 5 status = {"error":"no blueprint"}
35472025-03-07T23:12:05.151ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 5 reason = Dependency
35482025-03-07T23:12:05.151ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 13.951\u{b5}s iteration = 5 status = {"error":"task disabled"}
35492025-03-07T23:12:05.155ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35502025-03-07T23:12:05.161ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
35512025-03-07T23:12:05.161ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35522025-03-07T23:12:05.161ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35532025-03-07T23:12:05.162ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35542025-03-07T23:12:05.165ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35552025-03-07T23:12:05.165ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35562025-03-07T23:12:05.166ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35572025-03-07T23:12:05.168ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(ee68d9db-a598-40b9-abec-64d117a8e69d, 0), (f33e4288-077a-44df-abb1-92cf385c9241, 0), (3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0), (244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0)] collection_id = ee68d9db-a598-40b9-abec-64d117a8e69d
35582025-03-07T23:12:05.169ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35592025-03-07T23:12:05.169ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35602025-03-07T23:12:05.169ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35612025-03-07T23:12:05.215ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
35622025-03-07T23:12:05.217ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35632025-03-07T23:12:05.219ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35642025-03-07T23:12:05.219ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35652025-03-07T23:12:05.219ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35662025-03-07T23:12:05.219ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35672025-03-07T23:12:05.220ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35682025-03-07T23:12:05.220ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35692025-03-07T23:12:05.220ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35702025-03-07T23:12:05.220ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37937 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35712025-03-07T23:12:05.220ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:37937 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35722025-03-07T23:12:05.220ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:37937 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35732025-03-07T23:12:05.220ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:37937 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35742025-03-07T23:12:05.220ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = ffcec590-0d03-4403-ad33-451f8535fdaf serial = totally-unique-serial: ffcec590-0d03-4403-ad33-451f8535fdaf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
35752025-03-07T23:12:05.220ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35762025-03-07T23:12:05.220ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35772025-03-07T23:12:05.220ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35782025-03-07T23:12:05.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
35792025-03-07T23:12:05.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
35802025-03-07T23:12:05.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
35812025-03-07T23:12:05.221ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
35822025-03-07T23:12:05.221ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
35832025-03-07T23:12:05.222ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
35842025-03-07T23:12:05.222ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:05.218879347Z } timeseries_name = integration_target:integration_metric
35852025-03-07T23:12:05.222ZDEBGtest_unauthorized (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
35862025-03-07T23:12:05.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
35872025-03-07T23:12:05.223ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35882025-03-07T23:12:05.224ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35892025-03-07T23:12:05.228ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35902025-03-07T23:12:05.229ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
35912025-03-07T23:12:05.229ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35922025-03-07T23:12:05.229ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35932025-03-07T23:12:05.229ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35942025-03-07T23:12:05.229ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35952025-03-07T23:12:05.229ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35962025-03-07T23:12:05.237ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
35972025-03-07T23:12:05.237ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
35982025-03-07T23:12:05.241ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
35992025-03-07T23:12:05.241ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
36002025-03-07T23:12:05.244ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
36012025-03-07T23:12:05.245ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
36022025-03-07T23:12:05.260ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = ffcec590-0d03-4403-ad33-451f8535fdaf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 25887b79-b28b-4171-99a8-6100028a7952
36032025-03-07T23:12:05.261ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36042025-03-07T23:12:05.261ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36052025-03-07T23:12:05.261ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36062025-03-07T23:12:05.261ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = ee68d9db-a598-40b9-abec-64d117a8e69d ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 0 nphysical_disks = 0 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 0
36072025-03-07T23:12:05.262ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
36082025-03-07T23:12:05.262ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
36092025-03-07T23:12:05.262ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
36102025-03-07T23:12:05.264ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
36112025-03-07T23:12:05.264ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36122025-03-07T23:12:05.264ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36132025-03-07T23:12:05.265ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36142025-03-07T23:12:05.265ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36152025-03-07T23:12:05.268ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(f33e4288-077a-44df-abb1-92cf385c9241, 0), (3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0), (244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0)]
36162025-03-07T23:12:05.269ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
36172025-03-07T23:12:05.269ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: d8 3f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .?..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:65044 req_id = f7c14dc7-bafb-4d13-8d5c-ff30eb0308a0
36182025-03-07T23:12:05.269ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 55359,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65044 req_id = f7c14dc7-bafb-4d13-8d5c-ff30eb0308a0
36192025-03-07T23:12:05.269ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
36202025-03-07T23:12:05.270ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
36212025-03-07T23:12:05.270ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:65044 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = f7c14dc7-bafb-4d13-8d5c-ff30eb0308a0
36222025-03-07T23:12:05.271ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
36232025-03-07T23:12:05.278ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
36242025-03-07T23:12:05.280ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2810, tv_nsec: 57461498 } })
36252025-03-07T23:12:05.280ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
36262025-03-07T23:12:05.284ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: c6 09 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:53786 req_id = 4f84a10e-0313-4487-96eb-ac8fcaa3273f
36272025-03-07T23:12:05.285ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50697,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53786 req_id = 4f84a10e-0313-4487-96eb-ac8fcaa3273f
36282025-03-07T23:12:05.285ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
36292025-03-07T23:12:05.286ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:53786 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 4f84a10e-0313-4487-96eb-ac8fcaa3273f
36302025-03-07T23:12:05.363ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
36312025-03-07T23:12:05.365ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 zpool_id = 25887b79-b28b-4171-99a8-6100028a7952
36322025-03-07T23:12:05.366ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
36332025-03-07T23:12:05.367ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 14 af 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:53753 req_id = 8abbe852-af5b-420e-b8fa-072b80a4c50d
36342025-03-07T23:12:05.367ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 5295,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53753 req_id = 8abbe852-af5b-420e-b8fa-072b80a4c50d
36352025-03-07T23:12:05.367ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
36362025-03-07T23:12:05.367ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 5295, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:53753 req_id = 8abbe852-af5b-420e-b8fa-072b80a4c50d
36372025-03-07T23:12:05.368ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
36382025-03-07T23:12:05.368ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
36392025-03-07T23:12:05.368ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
36402025-03-07T23:12:05.371ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "d0e52327-f79c-409b-934b-06ceb5f8e3be", "content-length": "835", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36412025-03-07T23:12:05.372ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
36422025-03-07T23:12:05.375ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "aae6df2d-7d2d-4df7-85f2-8ce7c3d29650", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36432025-03-07T23:12:05.376ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
36442025-03-07T23:12:05.380ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "dc0971ab-1eec-46e6-91f2-83fdb0546ff8", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36452025-03-07T23:12:05.380ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
36462025-03-07T23:12:05.382ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
36472025-03-07T23:12:05.382ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36482025-03-07T23:12:05.383ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36492025-03-07T23:12:05.384ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36502025-03-07T23:12:05.384ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36512025-03-07T23:12:05.386ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
36522025-03-07T23:12:05.414ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
36532025-03-07T23:12:05.414ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36542025-03-07T23:12:05.415ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36552025-03-07T23:12:05.415ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36562025-03-07T23:12:05.417ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36572025-03-07T23:12:05.417ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36582025-03-07T23:12:05.421ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36592025-03-07T23:12:05.422ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3fe8a1cf-4ffe-4b9b-949b-a74ddda19ab4", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36602025-03-07T23:12:05.422ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
36612025-03-07T23:12:05.431ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "49ed0327-888a-4044-9698-92002baa4b1d", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36622025-03-07T23:12:05.431ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
36632025-03-07T23:12:05.440ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "22abce24-13ca-4556-aa26-41c30f3eab30", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36642025-03-07T23:12:05.440ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
36652025-03-07T23:12:05.446ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b916a867-f7ec-4038-983d-d228ddd26a41", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36662025-03-07T23:12:05.446ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
36672025-03-07T23:12:05.458ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "be7c8097-f6cb-44b8-b005-ff0ee271ac3d", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36682025-03-07T23:12:05.458ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
36692025-03-07T23:12:05.462ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3009022d-3fe5-4cc6-95fd-ae8fe47ee136", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36702025-03-07T23:12:05.462ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
36712025-03-07T23:12:05.465ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ece8eb41-b2df-472f-8690-55662743248f", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36722025-03-07T23:12:05.465ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
36732025-03-07T23:12:05.466ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5589ef70-7bbe-4908-96ca-484a30f52c32", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36742025-03-07T23:12:05.466ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
36752025-03-07T23:12:05.467ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "34b3f7d6-7c3e-40f4-b889-8ae13728fa83", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36762025-03-07T23:12:05.467ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
36772025-03-07T23:12:05.469ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "afa4fa19-76a8-47e1-b8c7-34985036854d", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:04 GMT"} })
36782025-03-07T23:12:05.470ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
36792025-03-07T23:12:05.490ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
36802025-03-07T23:12:05.490ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "bda4e36e-ff26-4186-82d6-7700bc28eb4c", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36812025-03-07T23:12:05.492ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
36822025-03-07T23:12:05.506ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fe6fa98e-8744-498a-810d-f09905349bfb", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36832025-03-07T23:12:05.506ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
36842025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9988a804-2916-4db5-8d06-5142d8360583", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36852025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
36862025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5471107f-7a0c-4944-bb3d-7f4f04812ba5", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36872025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
36882025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "355b79e5-8325-4aa8-8e3d-00cc866d06a5", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36892025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
36902025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "314268e3-7288-4e61-9006-824e31033786", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36912025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
36922025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8218ba75-accd-4a39-ab11-3b438ee04199", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36932025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
36942025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e89ec630-a6c4-470a-bf4e-a0cdbca9d194", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36952025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
36962025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d32bb26c-d4e8-4ad9-8ff1-8b003ed27054", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36972025-03-07T23:12:05.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
36982025-03-07T23:12:05.509ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "19da8888-4a4c-4a5e-b28e-a4800a4eeff8", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
36992025-03-07T23:12:05.516ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
37002025-03-07T23:12:05.521ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8043fa4b-d39a-4432-b251-3b5dc4604529", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37012025-03-07T23:12:05.522ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
37022025-03-07T23:12:05.529ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ffe7fd1d-915a-46dd-9ebd-94614af25631", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37032025-03-07T23:12:05.531ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
37042025-03-07T23:12:05.546ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
37052025-03-07T23:12:05.546ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37062025-03-07T23:12:05.547ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37072025-03-07T23:12:05.547ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37082025-03-07T23:12:05.548ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37092025-03-07T23:12:05.551ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1fffcc60-4559-4de2-9101-456607661d0c", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37102025-03-07T23:12:05.553ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
37112025-03-07T23:12:05.553ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37122025-03-07T23:12:05.559ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
37132025-03-07T23:12:05.564ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37142025-03-07T23:12:05.564ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37152025-03-07T23:12:05.564ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37162025-03-07T23:12:05.565ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37172025-03-07T23:12:05.566ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37182025-03-07T23:12:05.566ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37192025-03-07T23:12:05.567ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a0dd59f-5967-4ca6-8769-af299c38205c", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37202025-03-07T23:12:05.573ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
37212025-03-07T23:12:05.573ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "069c6e14-8e54-4d3e-a4bc-16cb600ac4cd", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37222025-03-07T23:12:05.573ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
37232025-03-07T23:12:05.573ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "495d5aa8-52f7-4455-b61b-4745f274e137", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37242025-03-07T23:12:05.573ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
37252025-03-07T23:12:05.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
37262025-03-07T23:12:05.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37272025-03-07T23:12:05.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0965f2b3-69ea-47c9-b40a-5fcb218a4d3c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37282025-03-07T23:12:05.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0965f2b3-69ea-47c9-b40a-5fcb218a4d3c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37292025-03-07T23:12:05.573ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0965f2b3-69ea-47c9-b40a-5fcb218a4d3c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37302025-03-07T23:12:05.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0965f2b3-69ea-47c9-b40a-5fcb218a4d3c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37312025-03-07T23:12:05.576ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ae5af2e-70cd-418b-93e0-b3cac4c4d806", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37322025-03-07T23:12:05.576ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
37332025-03-07T23:12:05.577ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1ebce385-cc69-4ba6-b07f-f5f791a1cb79", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37342025-03-07T23:12:05.577ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
37352025-03-07T23:12:05.590ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 16671 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0965f2b3-69ea-47c9-b40a-5fcb218a4d3c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37362025-03-07T23:12:05.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37372025-03-07T23:12:05.593ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0965f2b3-69ea-47c9-b40a-5fcb218a4d3c", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37382025-03-07T23:12:05.593ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37392025-03-07T23:12:05.593ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37402025-03-07T23:12:05.593ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b6e065d1-1fa6-484d-a339-085d48cbdc23 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37412025-03-07T23:12:05.593ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b6e065d1-1fa6-484d-a339-085d48cbdc23 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37422025-03-07T23:12:05.593ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b6e065d1-1fa6-484d-a339-085d48cbdc23 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37432025-03-07T23:12:05.594ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b6e065d1-1fa6-484d-a339-085d48cbdc23 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37442025-03-07T23:12:05.598ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37452025-03-07T23:12:05.623ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37462025-03-07T23:12:05.623ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37472025-03-07T23:12:05.623ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37482025-03-07T23:12:05.624ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "917a7010-a1c3-4ed8-a1db-1aff0283acd4", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37492025-03-07T23:12:05.624ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
37502025-03-07T23:12:05.625ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "133ff846-bdf4-4791-a4ba-38bd6f4ed203", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37512025-03-07T23:12:05.625ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
37522025-03-07T23:12:05.626ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 34835 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b6e065d1-1fa6-484d-a339-085d48cbdc23 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
37532025-03-07T23:12:05.626ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9f4d9c8c-6e5b-4606-b894-fb61492d13c2", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37542025-03-07T23:12:05.627ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
37552025-03-07T23:12:05.631ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "b6e065d1-1fa6-484d-a339-085d48cbdc23", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37562025-03-07T23:12:05.644ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37572025-03-07T23:12:05.644ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
37582025-03-07T23:12:05.644ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
37592025-03-07T23:12:05.646ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7dae642c-d412-4f5f-bf03-c0bcf89f1ec8", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37602025-03-07T23:12:05.647ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
37612025-03-07T23:12:05.650ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ac263860-55ed-4397-82a7-909bb8fe2eca", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37622025-03-07T23:12:05.652ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
37632025-03-07T23:12:05.653ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "62783599-f493-4019-9010-111353864270", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37642025-03-07T23:12:05.653ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
37652025-03-07T23:12:05.654ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cbd5f92c-375d-422f-acbd-7c7ddc9de301", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37662025-03-07T23:12:05.654ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
37672025-03-07T23:12:05.656ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a6d9c64-bf0c-4efb-b53b-23c3e1e477bf", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37682025-03-07T23:12:05.656ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
37692025-03-07T23:12:05.659ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "20c5c0ec-3c36-4d85-9a7d-f888cb1766ca", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37702025-03-07T23:12:05.660ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
37712025-03-07T23:12:05.662ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee7210c7-29fe-422e-94ad-1d9b6fe76701", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37722025-03-07T23:12:05.664ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
37732025-03-07T23:12:05.664ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b32b1b6b-6ee3-4b7a-bd31-9a7f950cb494", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37742025-03-07T23:12:05.665ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
37752025-03-07T23:12:05.665ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e33dce0c-4f3b-4a9c-b581-15f9aada63b6", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37762025-03-07T23:12:05.665ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
37772025-03-07T23:12:05.665ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
37782025-03-07T23:12:05.665ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7cfcaa0c-6254-4d78-a626-ee13845e516c", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37792025-03-07T23:12:05.667ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
37802025-03-07T23:12:05.667ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bf0dfabb-04d9-4964-a0d5-503b272589a9", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
37812025-03-07T23:12:05.667ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
37822025-03-07T23:12:05.667ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37832025-03-07T23:12:05.667ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37842025-03-07T23:12:05.667ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37852025-03-07T23:12:05.667ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37862025-03-07T23:12:05.669ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37872025-03-07T23:12:05.674ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
37882025-03-07T23:12:05.675ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
37892025-03-07T23:12:05.675ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37902025-03-07T23:12:05.675ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37912025-03-07T23:12:05.675ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37922025-03-07T23:12:05.675ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37932025-03-07T23:12:05.687ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37942025-03-07T23:12:05.691ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
37952025-03-07T23:12:05.692ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37962025-03-07T23:12:05.692ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37972025-03-07T23:12:05.693ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37982025-03-07T23:12:05.731ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
37992025-03-07T23:12:05.732ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
38002025-03-07T23:12:05.732ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
38012025-03-07T23:12:05.732ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38022025-03-07T23:12:05.732ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38032025-03-07T23:12:05.732ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38042025-03-07T23:12:05.732ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38052025-03-07T23:12:05.732ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34796 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38062025-03-07T23:12:05.733ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34796 req_id = fdc89d70-48d0-4cbd-986d-81e39c6ca9ca sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
38072025-03-07T23:12:05.734ZINFOtest_unauthorized (dropshot): request completed latency_us = 525 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34796 req_id = fdc89d70-48d0-4cbd-986d-81e39c6ca9ca response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
38082025-03-07T23:12:05.734ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "fdc89d70-48d0-4cbd-986d-81e39c6ca9ca", "content-length": "3889", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
38092025-03-07T23:12:05.736ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
38102025-03-07T23:12:05.736ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
38112025-03-07T23:12:05.736ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
38122025-03-07T23:12:05.738ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
38132025-03-07T23:12:05.738ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38142025-03-07T23:12:05.738ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38152025-03-07T23:12:05.738ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38162025-03-07T23:12:05.738ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38172025-03-07T23:12:05.739ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38182025-03-07T23:12:05.746ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
38192025-03-07T23:12:05.746ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38202025-03-07T23:12:05.746ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38212025-03-07T23:12:05.746ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38222025-03-07T23:12:05.752ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38232025-03-07T23:12:05.756ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
38242025-03-07T23:12:05.757ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38252025-03-07T23:12:05.757ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38262025-03-07T23:12:05.757ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38272025-03-07T23:12:05.759ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38282025-03-07T23:12:05.759ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38292025-03-07T23:12:05.760ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38302025-03-07T23:12:05.823ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
38312025-03-07T23:12:05.876ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
38322025-03-07T23:12:05.876ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38332025-03-07T23:12:05.876ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38342025-03-07T23:12:05.876ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38352025-03-07T23:12:05.876ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38362025-03-07T23:12:05.883ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38372025-03-07T23:12:05.895ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
38382025-03-07T23:12:05.895ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38392025-03-07T23:12:05.895ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38402025-03-07T23:12:05.895ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38412025-03-07T23:12:05.926ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = e6f7b299-5bab-4a81-a75e-1a31e76d4a67
38422025-03-07T23:12:05.926ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = e6f7b299-5bab-4a81-a75e-1a31e76d4a67 time_started = 2025-03-07 23:12:05.368088 UTC
38432025-03-07T23:12:05.926ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 776.565753ms iteration = 6 status = {"collection_id":"e6f7b299-5bab-4a81-a75e-1a31e76d4a67","time_done":"2025-03-07 23:12:05.736065 UTC","time_started":"2025-03-07 23:12:05.368088 UTC"}
38442025-03-07T23:12:05.926ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 7 reason = Signaled
38452025-03-07T23:12:05.926ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
38462025-03-07T23:12:05.926ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38472025-03-07T23:12:05.926ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38482025-03-07T23:12:05.926ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38492025-03-07T23:12:05.927ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38502025-03-07T23:12:05.927ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 6 reason = Dependency
38512025-03-07T23:12:05.927ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 54.072\u{b5}s iteration = 6 status = {"error":"task disabled"}
38522025-03-07T23:12:05.927ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 6 reason = Dependency
38532025-03-07T23:12:05.927ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
38542025-03-07T23:12:05.928ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 20.331\u{b5}s iteration = 6 status = {"error":"no blueprint"}
38552025-03-07T23:12:05.932ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38562025-03-07T23:12:05.936ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
38572025-03-07T23:12:05.936ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38582025-03-07T23:12:05.936ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38592025-03-07T23:12:05.936ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38602025-03-07T23:12:05.942ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(f33e4288-077a-44df-abb1-92cf385c9241, 0), (3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0), (244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0), (e6f7b299-5bab-4a81-a75e-1a31e76d4a67, 0)] collection_id = f33e4288-077a-44df-abb1-92cf385c9241
38612025-03-07T23:12:05.942ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38622025-03-07T23:12:05.942ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38632025-03-07T23:12:05.943ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38642025-03-07T23:12:05.945ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38652025-03-07T23:12:05.945ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38662025-03-07T23:12:05.946ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38672025-03-07T23:12:05.994ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
38682025-03-07T23:12:05.995ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38692025-03-07T23:12:05.995ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38702025-03-07T23:12:05.995ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38712025-03-07T23:12:05.995ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38722025-03-07T23:12:05.996ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38732025-03-07T23:12:05.997ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38742025-03-07T23:12:05.997ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38752025-03-07T23:12:05.997ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38762025-03-07T23:12:05.997ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40767 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38772025-03-07T23:12:05.997ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:40767 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38782025-03-07T23:12:05.997ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:40767 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38792025-03-07T23:12:05.997ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:40767 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38802025-03-07T23:12:05.997ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e serial = totally-unique-serial: fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
38812025-03-07T23:12:05.997ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38822025-03-07T23:12:05.997ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38832025-03-07T23:12:05.997ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38842025-03-07T23:12:05.998ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38852025-03-07T23:12:05.999ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38862025-03-07T23:12:05.999ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38872025-03-07T23:12:06.002ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
38882025-03-07T23:12:06.003ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38892025-03-07T23:12:06.003ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38902025-03-07T23:12:06.003ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38912025-03-07T23:12:06.003ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38922025-03-07T23:12:06.005ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38932025-03-07T23:12:06.009ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
38942025-03-07T23:12:06.025ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 59f70ac9-e265-4936-a82b-954ffc6689eb
38952025-03-07T23:12:06.026ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38962025-03-07T23:12:06.026ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38972025-03-07T23:12:06.026ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38982025-03-07T23:12:06.034ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
38992025-03-07T23:12:06.034ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39002025-03-07T23:12:06.034ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39012025-03-07T23:12:06.034ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39022025-03-07T23:12:06.035ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39032025-03-07T23:12:06.037ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39042025-03-07T23:12:06.042ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39052025-03-07T23:12:06.043ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = f33e4288-077a-44df-abb1-92cf385c9241 ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 0 nphysical_disks = 0 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 0
39062025-03-07T23:12:06.044ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
39072025-03-07T23:12:06.044ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
39082025-03-07T23:12:06.044ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
39092025-03-07T23:12:06.055ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0), (244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0), (e6f7b299-5bab-4a81-a75e-1a31e76d4a67, 0)]
39102025-03-07T23:12:06.055ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
39112025-03-07T23:12:06.055ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 5e 30 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ^0..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:60567 req_id = 991e1783-0b69-4eaa-bab1-94683b3e2d6e
39122025-03-07T23:12:06.055ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 24112,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60567 req_id = 991e1783-0b69-4eaa-bab1-94683b3e2d6e
39132025-03-07T23:12:06.055ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
39142025-03-07T23:12:06.055ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
39152025-03-07T23:12:06.055ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:60567 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 991e1783-0b69-4eaa-bab1-94683b3e2d6e
39162025-03-07T23:12:06.055ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2810, tv_nsec: 830928621 } })
39172025-03-07T23:12:06.055ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
39182025-03-07T23:12:06.055ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: f4 78 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .x..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:54731 req_id = c2a935af-7632-4f75-b1c5-0e3abc5face1
39192025-03-07T23:12:06.055ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 62584,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54731 req_id = c2a935af-7632-4f75-b1c5-0e3abc5face1
39202025-03-07T23:12:06.056ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
39212025-03-07T23:12:06.056ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:54731 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = c2a935af-7632-4f75-b1c5-0e3abc5face1
39222025-03-07T23:12:06.090ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
39232025-03-07T23:12:06.090ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = dfafd922-ff6f-46aa-896b-3058e64f8ce4 zpool_id = 59f70ac9-e265-4936-a82b-954ffc6689eb
39242025-03-07T23:12:06.091ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 7a aa 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c z............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:49653 req_id = ee9c2b1b-aba7-4111-b751-8fe5233997b5
39252025-03-07T23:12:06.091ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 31402,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49653 req_id = ee9c2b1b-aba7-4111-b751-8fe5233997b5
39262025-03-07T23:12:06.092ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
39272025-03-07T23:12:06.092ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 31402, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:49653 req_id = ee9c2b1b-aba7-4111-b751-8fe5233997b5
39282025-03-07T23:12:06.092ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
39292025-03-07T23:12:06.092ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
39302025-03-07T23:12:06.093ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
39312025-03-07T23:12:06.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "37adb75f-6ee8-456e-9c07-8cd7acc7d4d0", "content-length": "835", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39322025-03-07T23:12:06.096ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
39332025-03-07T23:12:06.098ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee0776f9-1c73-4db0-8091-784f2df9bc96", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39342025-03-07T23:12:06.098ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
39352025-03-07T23:12:06.100ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "022c66fe-4647-4b29-b23e-c274b5efb7fa", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39362025-03-07T23:12:06.100ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
39372025-03-07T23:12:06.103ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "edeec712-d856-4b45-9dbd-b7085aed5341", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39382025-03-07T23:12:06.104ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
39392025-03-07T23:12:06.106ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fcc66c74-d812-4f32-9ffd-094aa820a871", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39402025-03-07T23:12:06.106ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
39412025-03-07T23:12:06.107ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "addbf44b-c166-4d8e-ab4f-3d2a1e05f625", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39422025-03-07T23:12:06.108ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
39432025-03-07T23:12:06.109ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "160d6184-43f7-4e14-bf26-a208085654b7", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39442025-03-07T23:12:06.109ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
39452025-03-07T23:12:06.112ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e serial = totally-unique-serial: fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
39462025-03-07T23:12:06.112ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39472025-03-07T23:12:06.112ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39482025-03-07T23:12:06.112ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39492025-03-07T23:12:06.112ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "46ca2a5a-6d00-4410-8b11-b75bc675bb9b", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39502025-03-07T23:12:06.112ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
39512025-03-07T23:12:06.113ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a6eb018a-996a-4823-8042-4dbe1c907648", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39522025-03-07T23:12:06.113ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
39532025-03-07T23:12:06.114ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = PhysicalDisk { parent: Fleet, key: fbf4e1f1-410e-4314-bff1-fec0504be07e (physical_disk), lookup_type: ById(fbf4e1f1-410e-4314-bff1-fec0504be07e) }
39542025-03-07T23:12:06.116ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39552025-03-07T23:12:06.116ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39562025-03-07T23:12:06.116ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39572025-03-07T23:12:06.116ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39582025-03-07T23:12:06.116ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb02eb27-b026-45c4-b9cd-aaba146bf548", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39592025-03-07T23:12:06.116ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
39602025-03-07T23:12:06.117ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "adbcbdd0-3e14-46b9-a60c-90492715a6b1", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39612025-03-07T23:12:06.118ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
39622025-03-07T23:12:06.118ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39632025-03-07T23:12:06.124ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = PhysicalDisk { parent: Fleet, key: fbf4e1f1-410e-4314-bff1-fec0504be07e (physical_disk), lookup_type: ById(fbf4e1f1-410e-4314-bff1-fec0504be07e) } result = Ok(())
39642025-03-07T23:12:06.124ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 59f70ac9-e265-4936-a82b-954ffc6689eb
39652025-03-07T23:12:06.124ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39662025-03-07T23:12:06.124ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39672025-03-07T23:12:06.125ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39682025-03-07T23:12:06.127ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
39692025-03-07T23:12:06.127ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39702025-03-07T23:12:06.127ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39712025-03-07T23:12:06.127ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39722025-03-07T23:12:06.128ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39732025-03-07T23:12:06.131ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1b5c6f7-0fe3-44d9-9bba-93f9a7491db3", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39742025-03-07T23:12:06.131ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
39752025-03-07T23:12:06.131ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8d78125-f19d-45cd-8d52-1980c37bfa92", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39762025-03-07T23:12:06.131ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
39772025-03-07T23:12:06.131ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39782025-03-07T23:12:06.133ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39792025-03-07T23:12:06.136ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "326a282b-e67c-49a9-9767-21135bdb2585", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39802025-03-07T23:12:06.136ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
39812025-03-07T23:12:06.138ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5321bd3a-3564-4210-8167-485b74ec1b9f", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39822025-03-07T23:12:06.140ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
39832025-03-07T23:12:06.141ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "956b7453-87c9-4c08-978a-08d6d93470d3", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39842025-03-07T23:12:06.141ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
39852025-03-07T23:12:06.143ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1ac9e81c-a4ed-46bf-9292-07e907efe8e9", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39862025-03-07T23:12:06.143ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
39872025-03-07T23:12:06.146ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "91acb35d-2a22-430e-a897-911deb60f231", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
39882025-03-07T23:12:06.148ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
39892025-03-07T23:12:06.149ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
39902025-03-07T23:12:06.149ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39912025-03-07T23:12:06.149ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39922025-03-07T23:12:06.149ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39932025-03-07T23:12:06.150ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39942025-03-07T23:12:06.154ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39952025-03-07T23:12:06.159ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39962025-03-07T23:12:06.159ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39972025-03-07T23:12:06.159ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39982025-03-07T23:12:06.160ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39992025-03-07T23:12:06.162ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4b4c0a3-7c1a-4805-979c-6c8428a4c19c", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40002025-03-07T23:12:06.163ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
40012025-03-07T23:12:06.164ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a0a7eddd-f4ec-47ff-af0a-29eca24e979c", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40022025-03-07T23:12:06.164ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
40032025-03-07T23:12:06.166ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec45e391-2778-4bf3-baaa-be19ef6b2bf6", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40042025-03-07T23:12:06.167ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
40052025-03-07T23:12:06.168ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "af92c667-426d-4ec5-8e18-47699a41e222", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40062025-03-07T23:12:06.168ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
40072025-03-07T23:12:06.169ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2d7b4cda-7577-4266-a2c8-cfb70cee6877", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40082025-03-07T23:12:06.170ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
40092025-03-07T23:12:06.170ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1c5b0cb-cc07-4cd8-9dca-11aac9af192f", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40102025-03-07T23:12:06.170ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
40112025-03-07T23:12:06.172ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fedd0ae6-3f0a-433d-8b0e-735db65d9f73", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40122025-03-07T23:12:06.173ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
40132025-03-07T23:12:06.175ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "85444d02-32d9-454c-acbf-d30b3661a88f", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40142025-03-07T23:12:06.179ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
40152025-03-07T23:12:06.179ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "91266e28-4110-4966-bd9f-ec2599990acb", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40162025-03-07T23:12:06.179ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
40172025-03-07T23:12:06.179ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "efd80672-b880-4c7d-8886-a443767282bb", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40182025-03-07T23:12:06.179ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
40192025-03-07T23:12:06.180ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "89543e8c-f9da-496d-839a-3708dc2ac025", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40202025-03-07T23:12:06.182ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
40212025-03-07T23:12:06.183ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7f121506-fa66-4609-8c65-568e0defa59a", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40222025-03-07T23:12:06.183ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
40232025-03-07T23:12:06.183ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "339a435c-14a3-4176-b0ec-592d6dead4f3", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40242025-03-07T23:12:06.183ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
40252025-03-07T23:12:06.185ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "80012d29-834b-4f7f-a27c-e606df72edf1", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40262025-03-07T23:12:06.185ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
40272025-03-07T23:12:06.186ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4eda9f42-4e62-4b03-ae78-d97fc4430888", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40282025-03-07T23:12:06.186ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
40292025-03-07T23:12:06.187ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bf01cc26-5be7-409e-90d3-417f68ee4119", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40302025-03-07T23:12:06.188ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
40312025-03-07T23:12:06.189ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6116d291-998a-44d8-8919-b0f9197142ed", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40322025-03-07T23:12:06.189ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
40332025-03-07T23:12:06.191ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad803f4a-57f9-4ef0-b26b-09625f4b5656", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40342025-03-07T23:12:06.191ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
40352025-03-07T23:12:06.193ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "abe38799-20cb-4fb8-a35d-90734b6fc1ce", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40362025-03-07T23:12:06.193ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
40372025-03-07T23:12:06.195ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a14dc763-1be2-4c35-96fe-e690a1f1a76d", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40382025-03-07T23:12:06.195ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
40392025-03-07T23:12:06.197ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "20673dec-60ad-4388-b19a-52d3e444a886", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40402025-03-07T23:12:06.197ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
40412025-03-07T23:12:06.199ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "89f06dc0-9500-47c2-997e-b7e512cdd2a5", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40422025-03-07T23:12:06.199ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
40432025-03-07T23:12:06.200ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9663c7ae-a7d7-4570-a97d-02ba7d862b02", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40442025-03-07T23:12:06.201ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
40452025-03-07T23:12:06.201ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
40462025-03-07T23:12:06.201ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40472025-03-07T23:12:06.201ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40482025-03-07T23:12:06.202ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40492025-03-07T23:12:06.202ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40502025-03-07T23:12:06.203ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "179f283e-6016-4c06-8f4f-d093f95585e8", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40512025-03-07T23:12:06.203ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
40522025-03-07T23:12:06.204ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "521e2a5c-b078-4004-bc7b-a954c137b0a2", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40532025-03-07T23:12:06.204ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
40542025-03-07T23:12:06.206ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b76ef85-1cee-4084-a50f-f5187e7ad383", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40552025-03-07T23:12:06.206ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
40562025-03-07T23:12:06.207ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40572025-03-07T23:12:06.217ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
40582025-03-07T23:12:06.217ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40592025-03-07T23:12:06.217ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40602025-03-07T23:12:06.218ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40612025-03-07T23:12:06.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40622025-03-07T23:12:06.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40632025-03-07T23:12:06.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
40642025-03-07T23:12:06.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
40652025-03-07T23:12:06.222ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0dcb5b5b-08e7-4d7d-a116-63c025b863c7", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40662025-03-07T23:12:06.223ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
40672025-03-07T23:12:06.223ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40682025-03-07T23:12:06.223ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40692025-03-07T23:12:06.223ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40702025-03-07T23:12:06.223ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40712025-03-07T23:12:06.223ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40722025-03-07T23:12:06.224ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40732025-03-07T23:12:06.225ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40742025-03-07T23:12:06.226ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40752025-03-07T23:12:06.230ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
40762025-03-07T23:12:06.230ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
40772025-03-07T23:12:06.230ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40782025-03-07T23:12:06.230ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40792025-03-07T23:12:06.230ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40802025-03-07T23:12:06.230ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40812025-03-07T23:12:06.238ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
40822025-03-07T23:12:06.238ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
40832025-03-07T23:12:06.238ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40842025-03-07T23:12:06.243ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
40852025-03-07T23:12:06.244ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40862025-03-07T23:12:06.244ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40872025-03-07T23:12:06.244ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40882025-03-07T23:12:06.246ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
40892025-03-07T23:12:06.246ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40902025-03-07T23:12:06.278ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
40912025-03-07T23:12:06.278ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
40922025-03-07T23:12:06.278ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34798 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
40932025-03-07T23:12:06.283ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34798 req_id = 7235a95a-7d1d-4c56-ae02-665d212c34d9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
40942025-03-07T23:12:06.284ZINFOtest_unauthorized (dropshot): request completed latency_us = 724 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34798 req_id = 7235a95a-7d1d-4c56-ae02-665d212c34d9 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
40952025-03-07T23:12:06.284ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "7235a95a-7d1d-4c56-ae02-665d212c34d9", "content-length": "4263", "date": "Fri, 07 Mar 2025 23:12:05 GMT"} })
40962025-03-07T23:12:06.287ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
40972025-03-07T23:12:06.288ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
40982025-03-07T23:12:06.288ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
40992025-03-07T23:12:06.288ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
41002025-03-07T23:12:06.288ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41012025-03-07T23:12:06.290ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41022025-03-07T23:12:06.290ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41032025-03-07T23:12:06.290ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41042025-03-07T23:12:06.291ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41052025-03-07T23:12:06.296ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
41062025-03-07T23:12:06.297ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41072025-03-07T23:12:06.297ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41082025-03-07T23:12:06.297ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41092025-03-07T23:12:06.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
41102025-03-07T23:12:06.331ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
41112025-03-07T23:12:06.383ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
41122025-03-07T23:12:06.384ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41132025-03-07T23:12:06.384ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41142025-03-07T23:12:06.384ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41152025-03-07T23:12:06.384ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41162025-03-07T23:12:06.387ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41172025-03-07T23:12:06.393ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
41182025-03-07T23:12:06.394ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41192025-03-07T23:12:06.394ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41202025-03-07T23:12:06.394ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41212025-03-07T23:12:06.443ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = cfa51ed8-1d85-46f1-aa9b-ac879145a901
41222025-03-07T23:12:06.444ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = cfa51ed8-1d85-46f1-aa9b-ac879145a901 time_started = 2025-03-07 23:12:06.092847 UTC
41232025-03-07T23:12:06.444ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 517.661265ms iteration = 7 status = {"collection_id":"cfa51ed8-1d85-46f1-aa9b-ac879145a901","time_done":"2025-03-07 23:12:06.287082 UTC","time_started":"2025-03-07 23:12:06.092847 UTC"}
41242025-03-07T23:12:06.444ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 8 reason = Signaled
41252025-03-07T23:12:06.444ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
41262025-03-07T23:12:06.444ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41272025-03-07T23:12:06.444ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41282025-03-07T23:12:06.444ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41292025-03-07T23:12:06.445ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41302025-03-07T23:12:06.445ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 7 reason = Dependency
41312025-03-07T23:12:06.445ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
41322025-03-07T23:12:06.445ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 67.512\u{b5}s iteration = 7 status = {"error":"no blueprint"}
41332025-03-07T23:12:06.445ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 7 reason = Dependency
41342025-03-07T23:12:06.446ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 11.22\u{b5}s iteration = 7 status = {"error":"task disabled"}
41352025-03-07T23:12:06.447ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41362025-03-07T23:12:06.453ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
41372025-03-07T23:12:06.453ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41382025-03-07T23:12:06.453ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41392025-03-07T23:12:06.453ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41402025-03-07T23:12:06.468ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(3c78ec8d-7908-47f4-b23f-a2eeff11961c, 0), (244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0), (e6f7b299-5bab-4a81-a75e-1a31e76d4a67, 0), (cfa51ed8-1d85-46f1-aa9b-ac879145a901, 0)] collection_id = 3c78ec8d-7908-47f4-b23f-a2eeff11961c
41412025-03-07T23:12:06.468ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41422025-03-07T23:12:06.469ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41432025-03-07T23:12:06.474ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41442025-03-07T23:12:06.475ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41452025-03-07T23:12:06.475ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41462025-03-07T23:12:06.475ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41472025-03-07T23:12:06.503ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
41482025-03-07T23:12:06.505ZINFOtest_unauthorized: setting up resource hierarchy
41492025-03-07T23:12:06.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos
41502025-03-07T23:12:06.511ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53894
41512025-03-07T23:12:06.512ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e uri = /v1/system/silos
41522025-03-07T23:12:06.518ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e uri = /v1/system/silos
41532025-03-07T23:12:06.518ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
41542025-03-07T23:12:06.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41552025-03-07T23:12:06.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41562025-03-07T23:12:06.518ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41572025-03-07T23:12:06.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41582025-03-07T23:12:06.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41592025-03-07T23:12:06.518ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41602025-03-07T23:12:06.521ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
41612025-03-07T23:12:06.522ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
41622025-03-07T23:12:06.522ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41632025-03-07T23:12:06.522ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41642025-03-07T23:12:06.522ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41652025-03-07T23:12:06.528ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41662025-03-07T23:12:06.529ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41672025-03-07T23:12:06.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41682025-03-07T23:12:06.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41692025-03-07T23:12:06.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
41702025-03-07T23:12:06.535ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
41712025-03-07T23:12:06.535ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41722025-03-07T23:12:06.535ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41732025-03-07T23:12:06.536ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41742025-03-07T23:12:06.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
41752025-03-07T23:12:06.538ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
41762025-03-07T23:12:06.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41772025-03-07T23:12:06.538ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41782025-03-07T23:12:06.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41792025-03-07T23:12:06.541ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41802025-03-07T23:12:06.543ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41812025-03-07T23:12:06.543ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41822025-03-07T23:12:06.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41832025-03-07T23:12:06.543ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
41842025-03-07T23:12:06.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
41852025-03-07T23:12:06.546ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e uri = /v1/system/silos
41862025-03-07T23:12:06.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41872025-03-07T23:12:06.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41882025-03-07T23:12:06.547ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41892025-03-07T23:12:06.547ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
41902025-03-07T23:12:06.547ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41912025-03-07T23:12:06.547ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41922025-03-07T23:12:06.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41932025-03-07T23:12:06.548ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41942025-03-07T23:12:06.549ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
41952025-03-07T23:12:06.553ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
41962025-03-07T23:12:06.555ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = BlueprintConfig uri = /v1/system/silos
41972025-03-07T23:12:06.556ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
41982025-03-07T23:12:06.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
41992025-03-07T23:12:06.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
42002025-03-07T23:12:06.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
42012025-03-07T23:12:06.573ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = 3c78ec8d-7908-47f4-b23f-a2eeff11961c ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 1 nphysical_disks = 1 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 1
42022025-03-07T23:12:06.573ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
42032025-03-07T23:12:06.573ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
42042025-03-07T23:12:06.574ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
42052025-03-07T23:12:06.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
42062025-03-07T23:12:06.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = BlueprintConfig result = Ok(()) uri = /v1/system/silos
42072025-03-07T23:12:06.580ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
42082025-03-07T23:12:06.580ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
42092025-03-07T23:12:06.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
42102025-03-07T23:12:06.582ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Blueprint { parent: Fleet, key: a3818c9f-fa3a-4b21-969a-331f3bbe4342, lookup_type: ById(a3818c9f-fa3a-4b21-969a-331f3bbe4342) } uri = /v1/system/silos
42112025-03-07T23:12:06.583ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
42122025-03-07T23:12:06.584ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
42132025-03-07T23:12:06.584ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
42142025-03-07T23:12:06.584ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
42152025-03-07T23:12:06.585ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(244ef5a5-92a9-4c75-8200-e6cf7512cc1f, 0), (e6f7b299-5bab-4a81-a75e-1a31e76d4a67, 0), (cfa51ed8-1d85-46f1-aa9b-ac879145a901, 0)]
42162025-03-07T23:12:06.585ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
42172025-03-07T23:12:06.585ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 61 b6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 a............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:50431 req_id = 574bd760-9203-490d-ac45-869bf26ab5f2
42182025-03-07T23:12:06.585ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 25014,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50431 req_id = 574bd760-9203-490d-ac45-869bf26ab5f2
42192025-03-07T23:12:06.585ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
42202025-03-07T23:12:06.585ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
42212025-03-07T23:12:06.586ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:50431 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 574bd760-9203-490d-ac45-869bf26ab5f2
42222025-03-07T23:12:06.586ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42897, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2811, tv_nsec: 363911364 } })
42232025-03-07T23:12:06.587ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
42242025-03-07T23:12:06.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42252025-03-07T23:12:06.587ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 71 cd 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e q...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:58820 req_id = 5f45614a-6823-4ab0-b9dd-dc468aac502b
42262025-03-07T23:12:06.587ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29133,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58820 req_id = 5f45614a-6823-4ab0-b9dd-dc468aac502b
42272025-03-07T23:12:06.588ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
42282025-03-07T23:12:06.588ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:58820 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 5f45614a-6823-4ab0-b9dd-dc468aac502b
42292025-03-07T23:12:06.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42302025-03-07T23:12:06.622ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
42312025-03-07T23:12:06.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
42322025-03-07T23:12:06.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Blueprint { parent: Fleet, key: a3818c9f-fa3a-4b21-969a-331f3bbe4342, lookup_type: ById(a3818c9f-fa3a-4b21-969a-331f3bbe4342) } result = Ok(()) uri = /v1/system/silos
42332025-03-07T23:12:06.634ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
42342025-03-07T23:12:06.634ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
42352025-03-07T23:12:06.634ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
42362025-03-07T23:12:06.634ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42372025-03-07T23:12:06.635ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42382025-03-07T23:12:06.635ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42392025-03-07T23:12:06.635ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42402025-03-07T23:12:06.635ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 40 f7 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c @............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:51713 req_id = 4ccac210-20d7-4114-b6ab-531040715b14
42412025-03-07T23:12:06.636ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 16631,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51713 req_id = 4ccac210-20d7-4114-b6ab-531040715b14
42422025-03-07T23:12:06.637ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
42432025-03-07T23:12:06.637ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 16631, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:51713 req_id = 4ccac210-20d7-4114-b6ab-531040715b14
42442025-03-07T23:12:06.637ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
42452025-03-07T23:12:06.637ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:42897
42462025-03-07T23:12:06.637ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/ignition
42472025-03-07T23:12:06.638ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "5724e7b4-9281-45d2-b73e-cf09e6acce44", "content-length": "835", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42482025-03-07T23:12:06.640ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0
42492025-03-07T23:12:06.640ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "85ddce87-a84b-4c35-8469-6317f6a0128a", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42502025-03-07T23:12:06.640ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0
42512025-03-07T23:12:06.643ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1b29c5a-b81c-4de8-bf35-7b1b65ce47a4", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42522025-03-07T23:12:06.644ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1
42532025-03-07T23:12:06.645ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a3a8ed72-b648-4a3e-96a7-40543171b60a", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42542025-03-07T23:12:06.646ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0
42552025-03-07T23:12:06.649ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3f9ed341-b41a-4d07-9650-3f1e80d44dfc", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42562025-03-07T23:12:06.651ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1
42572025-03-07T23:12:06.651ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8371d458-a151-40d0-bf5c-1cfcfaae1ab6", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42582025-03-07T23:12:06.651ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0
42592025-03-07T23:12:06.653ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e9254189-c3b2-4320-acde-9d374688482f", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42602025-03-07T23:12:06.653ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1
42612025-03-07T23:12:06.655ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ab7ad004-5218-474f-84d1-e1c5c7e41ec6", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42622025-03-07T23:12:06.655ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cmpa
42632025-03-07T23:12:06.655ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9c0d29d4-1de9-4603-90cd-ad04efada3a9", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42642025-03-07T23:12:06.655ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
42652025-03-07T23:12:06.656ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4dad8149-5b90-4f14-bb8f-d318498cad3f", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42662025-03-07T23:12:06.658ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
42672025-03-07T23:12:06.658ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7eb577a2-0d6e-416a-aae7-13d3fa35a076", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42682025-03-07T23:12:06.658ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/0/component/rot/cfpa
42692025-03-07T23:12:06.659ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8e0fd526-f079-4dfc-8049-33678284c2b4", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42702025-03-07T23:12:06.659ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1
42712025-03-07T23:12:06.660ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f11aa4f1-abf5-4c01-b057-34e5b7f72c72", "content-length": "734", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42722025-03-07T23:12:06.660ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0
42732025-03-07T23:12:06.661ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7f352f5a-90df-4986-9928-29e917c5d97f", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42742025-03-07T23:12:06.662ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1
42752025-03-07T23:12:06.663ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "709e9498-dd2c-4c12-9df5-97a12c8f003e", "content-length": "111", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42762025-03-07T23:12:06.663ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0
42772025-03-07T23:12:06.665ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "37f891b2-3799-4853-9c08-b18736af8450", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42782025-03-07T23:12:06.665ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1
42792025-03-07T23:12:06.667ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3c3f6bc2-45e0-4e82-a2ef-e582cb38d125", "content-length": "167", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42802025-03-07T23:12:06.667ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0
42812025-03-07T23:12:06.669ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "422bcdd5-1cf1-4bc8-8862-cfee62135c28", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42822025-03-07T23:12:06.669ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1
42832025-03-07T23:12:06.670ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0cc0f414-17e5-4746-b29e-8d51ac62a601", "content-length": "175", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42842025-03-07T23:12:06.671ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cmpa
42852025-03-07T23:12:06.671ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cba839b8-1a97-4aa3-a346-872db52cefde", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42862025-03-07T23:12:06.671ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
42872025-03-07T23:12:06.672ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b404d851-96ef-401a-90cf-349f7ff29e39", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42882025-03-07T23:12:06.673ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
42892025-03-07T23:12:06.673ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "df2d3fdb-17de-4445-b9a5-e1b8bd64b903", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42902025-03-07T23:12:06.673ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/switch/1/component/rot/cfpa
42912025-03-07T23:12:06.674ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2f7271c-d901-42fe-8aed-a4719b983cdb", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42922025-03-07T23:12:06.675ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0
42932025-03-07T23:12:06.675ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d9f1fba1-fc91-480c-b414-19bdd7c811a9", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42942025-03-07T23:12:06.675ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0
42952025-03-07T23:12:06.678ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "df254d79-3814-42b4-878b-f1918f009aff", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42962025-03-07T23:12:06.680ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1
42972025-03-07T23:12:06.680ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b9ef2167-8b1f-4258-9676-e81937e4b3f8", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
42982025-03-07T23:12:06.680ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0
42992025-03-07T23:12:06.681ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "88528519-4888-49b5-842e-8cf3f0c80ad1", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43002025-03-07T23:12:06.681ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1
43012025-03-07T23:12:06.683ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7771488e-7f95-4a6a-acf4-8b8bfc4c45d3", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43022025-03-07T23:12:06.683ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0
43032025-03-07T23:12:06.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
43042025-03-07T23:12:06.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
43052025-03-07T23:12:06.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
43062025-03-07T23:12:06.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Fleet uri = /v1/system/silos
43072025-03-07T23:12:06.686ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
43082025-03-07T23:12:06.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database uri = /v1/system/silos
43092025-03-07T23:12:06.686ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {} } uri = /v1/system/silos
43102025-03-07T23:12:06.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Database result = Ok(()) uri = /v1/system/silos
43112025-03-07T23:12:06.687ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1921005c-5b51-44d4-9087-f8fc14c09f6a", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43122025-03-07T23:12:06.688ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1
43132025-03-07T23:12:06.690ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f154401c-1aa1-4ff9-804c-015591495a23", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43142025-03-07T23:12:06.690ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cmpa
43152025-03-07T23:12:06.691ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2d5fac10-1bdc-4686-8c34-c445c7de6cac", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43162025-03-07T23:12:06.691ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
43172025-03-07T23:12:06.691ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
43182025-03-07T23:12:06.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e resource = Fleet result = Ok(()) uri = /v1/system/silos
43192025-03-07T23:12:06.696ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7272e9a5-d93a-4e3d-a375-d28da5d74682", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43202025-03-07T23:12:06.696ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
43212025-03-07T23:12:06.697ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a0a16b43-f9e0-4567-8b6c-b858be57a385", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43222025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/0/component/rot/cfpa
43232025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ddc524e7-2094-4c44-ba1b-0e0772352f68", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43242025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1
43252025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bab405a8-4ad7-41b9-af62-2149c9c6857a", "content-length": "723", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43262025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0
43272025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1fe674ed-8311-48d0-8abb-79e4c4e3098a", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43282025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1
43292025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "275a6233-71a8-4013-801f-a1c72cafa65b", "content-length": "109", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43302025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0
43312025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3ea5a8a0-b86a-4c73-9667-8a3033638b19", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43322025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1
43332025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cc64924c-e585-4123-a897-a94334750253", "content-length": "169", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43342025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0
43352025-03-07T23:12:06.723ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6460b5fa-2a57-4d19-8e9a-bb3375aa808f", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43362025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1
43372025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cec7b864-9ebb-4e23-81c3-075ba81f00a6", "content-length": "178", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43382025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cmpa
43392025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a0176790-0abe-4b50-85e5-39b9135a153e", "content-length": "702", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43402025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
43412025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff8c35d6-55c4-4ee8-9ed7-6a317ce79a24", "content-length": "727", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43422025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
43432025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2629997b-2bfd-4c13-90c5-fcee2e236886", "content-length": "729", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43442025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:42897 method = GET uri = http://[::1]:42897/sp/sled/1/component/rot/cfpa
43452025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:42897 result = Ok(Response { url: "http://[::1]:42897/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "40367417-d5e4-48d0-a6ca-2e3f2d90204d", "content-length": "728", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43462025-03-07T23:12:06.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
43472025-03-07T23:12:06.724ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43482025-03-07T23:12:06.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
43492025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
43502025-03-07T23:12:06.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
43512025-03-07T23:12:06.731ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43522025-03-07T23:12:06.735ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
43532025-03-07T23:12:06.735ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
43542025-03-07T23:12:06.736ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43552025-03-07T23:12:06.736ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
43562025-03-07T23:12:06.736ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
43572025-03-07T23:12:06.736ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
43582025-03-07T23:12:06.746ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43592025-03-07T23:12:06.751ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
43602025-03-07T23:12:06.751ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
43612025-03-07T23:12:06.751ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
43622025-03-07T23:12:06.752ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
43632025-03-07T23:12:06.796ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:41065
43642025-03-07T23:12:06.797ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:41065 background_task = inventory_collection body = None method = GET uri = http://[::1]:41065/inventory
43652025-03-07T23:12:06.797ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34800 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
43662025-03-07T23:12:06.798ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34800 req_id = 6f4dfe91-7ee8-4956-a15e-ab7a0ff009b4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
43672025-03-07T23:12:06.799ZINFOtest_unauthorized (dropshot): request completed latency_us = 896 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34800 req_id = 6f4dfe91-7ee8-4956-a15e-ab7a0ff009b4 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
43682025-03-07T23:12:06.799ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:41065 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:41065/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f4dfe91-7ee8-4956-a15e-ab7a0ff009b4", "content-length": "5165", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} })
43692025-03-07T23:12:06.801ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
43702025-03-07T23:12:06.801ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
43712025-03-07T23:12:06.801ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
43722025-03-07T23:12:06.803ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
43732025-03-07T23:12:06.803ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43742025-03-07T23:12:06.804ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
43752025-03-07T23:12:06.804ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
43762025-03-07T23:12:06.804ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
43772025-03-07T23:12:06.813ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43782025-03-07T23:12:06.816ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
43792025-03-07T23:12:06.817ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
43802025-03-07T23:12:06.817ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
43812025-03-07T23:12:06.817ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
43822025-03-07T23:12:06.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
43832025-03-07T23:12:06.823ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43842025-03-07T23:12:06.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43852025-03-07T23:12:06.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43862025-03-07T23:12:06.823ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43872025-03-07T23:12:06.828ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43882025-03-07T23:12:06.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
43892025-03-07T23:12:06.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
43902025-03-07T23:12:06.833ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43912025-03-07T23:12:06.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43922025-03-07T23:12:06.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43932025-03-07T23:12:06.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43942025-03-07T23:12:06.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43952025-03-07T23:12:06.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
43962025-03-07T23:12:06.854ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
43972025-03-07T23:12:06.854ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43982025-03-07T23:12:06.854ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43992025-03-07T23:12:06.854ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44002025-03-07T23:12:06.855ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44012025-03-07T23:12:06.857ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
44022025-03-07T23:12:06.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
44032025-03-07T23:12:06.899ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 3 reason = Signaled
44042025-03-07T23:12:06.899ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
44052025-03-07T23:12:06.900ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44062025-03-07T23:12:06.900ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44072025-03-07T23:12:06.900ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44082025-03-07T23:12:06.900ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 3 reason = Signaled
44092025-03-07T23:12:06.900ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
44102025-03-07T23:12:06.900ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44112025-03-07T23:12:06.900ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44122025-03-07T23:12:06.900ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44132025-03-07T23:12:06.900ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44142025-03-07T23:12:06.901ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 388960 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5eb84937-b57e-4d3b-858f-a6e8eb15608e response_code = 201 uri = /v1/system/silos
44152025-03-07T23:12:06.902ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
44162025-03-07T23:12:06.902ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44172025-03-07T23:12:06.903ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44182025-03-07T23:12:06.903ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44192025-03-07T23:12:06.903ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44202025-03-07T23:12:06.919ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44212025-03-07T23:12:06.926ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
44222025-03-07T23:12:06.926ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44232025-03-07T23:12:06.926ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44242025-03-07T23:12:06.926ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44252025-03-07T23:12:06.928ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44262025-03-07T23:12:06.936ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
44272025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
44282025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44292025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44302025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44312025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44322025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 3
44332025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
44342025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
44352025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
44362025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44372025-03-07T23:12:06.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44382025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44392025-03-07T23:12:06.939ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44402025-03-07T23:12:06.940ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44412025-03-07T23:12:06.946ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
44422025-03-07T23:12:06.947ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44432025-03-07T23:12:06.947ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44442025-03-07T23:12:06.947ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44452025-03-07T23:12:06.947ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44462025-03-07T23:12:06.954ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
44472025-03-07T23:12:06.954ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44482025-03-07T23:12:06.954ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44492025-03-07T23:12:06.954ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44502025-03-07T23:12:06.955ZINFOtest_unauthorized (external client test context): client received response status = 201
44512025-03-07T23:12:06.955ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
44522025-03-07T23:12:06.956ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
44532025-03-07T23:12:06.957ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44542025-03-07T23:12:06.957ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44552025-03-07T23:12:06.957ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44562025-03-07T23:12:06.957ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44572025-03-07T23:12:06.957ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
44582025-03-07T23:12:06.957ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 0 version = 3
44592025-03-07T23:12:06.957ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
44602025-03-07T23:12:06.957ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44612025-03-07T23:12:06.957ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44622025-03-07T23:12:06.957ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44632025-03-07T23:12:06.958ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44642025-03-07T23:12:06.958ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 uri = /v1/system/identity-providers/local/users?silo=default-silo
44652025-03-07T23:12:06.959ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 uri = /v1/system/identity-providers/local/users?silo=default-silo
44662025-03-07T23:12:06.959ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/identity-providers/local/users?silo=default-silo
44672025-03-07T23:12:06.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44682025-03-07T23:12:06.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44692025-03-07T23:12:06.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44702025-03-07T23:12:06.961ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44712025-03-07T23:12:06.965ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
44722025-03-07T23:12:06.967ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44732025-03-07T23:12:06.967ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44742025-03-07T23:12:06.967ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44752025-03-07T23:12:06.967ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44762025-03-07T23:12:06.973ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
44772025-03-07T23:12:06.974ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44782025-03-07T23:12:06.974ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44792025-03-07T23:12:06.975ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44802025-03-07T23:12:06.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44812025-03-07T23:12:06.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44822025-03-07T23:12:06.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44832025-03-07T23:12:06.979ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 2 version = 3
44842025-03-07T23:12:06.982ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 3
44852025-03-07T23:12:06.982ZINFOtest_unauthorized (BackgroundTasks): found latest DNS generation (newer than we had) background_task = dns_config_external current_generation = 2 current_time_created = 2025-03-07 23:11:59.358855 UTC dns_group = external generation = 3 old_generation = 2 old_time_created = 2025-03-07 23:11:59.358855 UTC time_created = 2025-03-07 23:12:06.865072 UTC
44862025-03-07T23:12:06.982ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 80.651146ms iteration = 3 status = {"generation":3}
44872025-03-07T23:12:06.982ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 4 reason = Dependency
44882025-03-07T23:12:07.023ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:45425 generation = 3 method = PUT servers = DnsServersList { addresses: [[::1]:45425] } uri = http://[::1]:45425/config
44892025-03-07T23:12:07.026ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
44902025-03-07T23:12:07.027ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
44912025-03-07T23:12:07.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44922025-03-07T23:12:07.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44932025-03-07T23:12:07.027ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44942025-03-07T23:12:07.027ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:45425 remote_addr = [::1]:33408
44952025-03-07T23:12:07.028ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33408 req_id = 3fcddb93-dc4c-4057-a337-7fab5187eed7 uri = /config
44962025-03-07T23:12:07.028ZINFOtest_unauthorized (store): attempting generation update new_generation = 3 req_id = 3fcddb93-dc4c-4057-a337-7fab5187eed7
44972025-03-07T23:12:07.028ZINFOtest_unauthorized (store): pruning trees for generations newer than 2
44982025-03-07T23:12:07.028ZDEBGtest_unauthorized (store): creating tree tree_name = generation_3_zone_oxide-dev.test
44992025-03-07T23:12:07.028ZDEBGtest_unauthorized (store): updating current config
45002025-03-07T23:12:07.029ZDEBGtest_unauthorized (store): flushing default tree
45012025-03-07T23:12:07.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45022025-03-07T23:12:07.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45032025-03-07T23:12:07.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45042025-03-07T23:12:07.030ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45052025-03-07T23:12:07.030ZINFOtest_unauthorized (store): pruning trees for generations older than 3 keep = 3
45062025-03-07T23:12:07.030ZINFOtest_unauthorized (store): updated generation new_generation = 3 req_id = 3fcddb93-dc4c-4057-a337-7fab5187eed7
45072025-03-07T23:12:07.031ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 4271 local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33408 req_id = 3fcddb93-dc4c-4057-a337-7fab5187eed7 response_code = 204 uri = /config
45082025-03-07T23:12:07.031ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 3 result = Ok(Response { url: "http://[::1]:45425/config", status: 204, headers: {"x-request-id": "3fcddb93-dc4c-4057-a337-7fab5187eed7", "date": "Fri, 07 Mar 2025 23:12:06 GMT"} }) servers = DnsServersList { addresses: [[::1]:45425] }
45092025-03-07T23:12:07.031ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 3 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 3 servers = DnsServersList { addresses: [[::1]:45425] }
45102025-03-07T23:12:07.032ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 3 servers = DnsServersList { addresses: [[::1]:45425] }
45112025-03-07T23:12:07.032ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 52.949996ms iteration = 4 status = {"generation":3,"server_results":{"[::1]:45425":{"Ok":null}}}
45122025-03-07T23:12:07.034ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45132025-03-07T23:12:07.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
45142025-03-07T23:12:07.038ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45152025-03-07T23:12:07.038ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45162025-03-07T23:12:07.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45172025-03-07T23:12:07.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
45182025-03-07T23:12:07.046ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45192025-03-07T23:12:07.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45202025-03-07T23:12:07.046ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45212025-03-07T23:12:07.047ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45222025-03-07T23:12:07.051ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45232025-03-07T23:12:07.052ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45242025-03-07T23:12:07.052ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45252025-03-07T23:12:07.052ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45262025-03-07T23:12:07.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45272025-03-07T23:12:07.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
45282025-03-07T23:12:07.067ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 uri = /v1/system/identity-providers/local/users?silo=default-silo
45292025-03-07T23:12:07.067ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45302025-03-07T23:12:07.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45312025-03-07T23:12:07.068ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45322025-03-07T23:12:07.068ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (changed) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:11:52.978055Z, time_modified: 2025-03-07T23:11:52.978055Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, db_silo: Silo { identity: SiloIdentity { id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:12:06.686087Z, time_modified: 2025-03-07T23:12:06.686087Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
45332025-03-07T23:12:07.069ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 168.713065ms iteration = 3 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"demo-silo.sys.oxide-dev.test":{"silo_id":"9d15cba3-0ce9-4052-9d95-bc0faa728916","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]}},"default_endpoint":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 9d15cba3-0ce9-4052-9d95-bc0faa728916 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0bb91424-f90c-4f11-acbb-98367ae5ccd9 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
45342025-03-07T23:12:07.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users?silo=default-silo
45352025-03-07T23:12:07.077ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
45362025-03-07T23:12:07.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45372025-03-07T23:12:07.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45382025-03-07T23:12:07.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45392025-03-07T23:12:07.100ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
45402025-03-07T23:12:07.101ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45412025-03-07T23:12:07.101ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45422025-03-07T23:12:07.102ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45432025-03-07T23:12:07.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45442025-03-07T23:12:07.140ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45452025-03-07T23:12:07.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/identity-providers/local/users?silo=default-silo
45462025-03-07T23:12:07.140ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
45472025-03-07T23:12:07.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45482025-03-07T23:12:07.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45492025-03-07T23:12:07.143ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45502025-03-07T23:12:07.151ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
45512025-03-07T23:12:07.152ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45522025-03-07T23:12:07.152ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45532025-03-07T23:12:07.153ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45542025-03-07T23:12:07.158ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45552025-03-07T23:12:07.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45562025-03-07T23:12:07.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } uri = /v1/system/identity-providers/local/users?silo=default-silo
45572025-03-07T23:12:07.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
45582025-03-07T23:12:07.173ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45592025-03-07T23:12:07.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45602025-03-07T23:12:07.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45612025-03-07T23:12:07.177ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 9edbe734-c53b-4096-8628-d68454e822bd
45622025-03-07T23:12:07.177ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 9edbe734-c53b-4096-8628-d68454e822bd time_started = 2025-03-07 23:12:06.636652 UTC
45632025-03-07T23:12:07.177ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 733.457983ms iteration = 8 status = {"collection_id":"9edbe734-c53b-4096-8628-d68454e822bd","time_done":"2025-03-07 23:12:06.801540 UTC","time_started":"2025-03-07 23:12:06.636652 UTC"}
45642025-03-07T23:12:07.177ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 8 reason = Dependency
45652025-03-07T23:12:07.178ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 197.176\u{b5}s iteration = 8 status = {"error":"task disabled"}
45662025-03-07T23:12:07.179ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 8 reason = Dependency
45672025-03-07T23:12:07.179ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
45682025-03-07T23:12:07.179ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 44.541\u{b5}s iteration = 8 status = {"error":"no blueprint"}
45692025-03-07T23:12:07.180ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
45702025-03-07T23:12:07.181ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45712025-03-07T23:12:07.181ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45722025-03-07T23:12:07.182ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45732025-03-07T23:12:07.184ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45742025-03-07T23:12:07.190ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45752025-03-07T23:12:07.190ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45762025-03-07T23:12:07.191ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45772025-03-07T23:12:07.191ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45782025-03-07T23:12:07.210ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 252199 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 927f7024-0cf0-4907-bc9f-c0a980045622 response_code = 201 uri = /v1/system/identity-providers/local/users?silo=default-silo
45792025-03-07T23:12:07.212ZINFOtest_unauthorized (external client test context): client received response status = 201
45802025-03-07T23:12:07.212ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools
45812025-03-07T23:12:07.212ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 uri = /v1/system/ip-pools
45822025-03-07T23:12:07.212ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 uri = /v1/system/ip-pools
45832025-03-07T23:12:07.212ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
45842025-03-07T23:12:07.213ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45852025-03-07T23:12:07.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45862025-03-07T23:12:07.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45872025-03-07T23:12:07.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45882025-03-07T23:12:07.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45892025-03-07T23:12:07.218ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45902025-03-07T23:12:07.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
45912025-03-07T23:12:07.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
45922025-03-07T23:12:07.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
45932025-03-07T23:12:07.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
45942025-03-07T23:12:07.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
45952025-03-07T23:12:07.223ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45962025-03-07T23:12:07.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45972025-03-07T23:12:07.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45982025-03-07T23:12:07.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45992025-03-07T23:12:07.226ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46002025-03-07T23:12:07.227ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46012025-03-07T23:12:07.227ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46022025-03-07T23:12:07.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46032025-03-07T23:12:07.233ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
46042025-03-07T23:12:07.233ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
46052025-03-07T23:12:07.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46062025-03-07T23:12:07.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
46072025-03-07T23:12:07.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46082025-03-07T23:12:07.251ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46092025-03-07T23:12:07.252ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46102025-03-07T23:12:07.254ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
46112025-03-07T23:12:07.254ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46122025-03-07T23:12:07.254ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46132025-03-07T23:12:07.254ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46142025-03-07T23:12:07.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46152025-03-07T23:12:07.263ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
46162025-03-07T23:12:07.265ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46172025-03-07T23:12:07.267ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46182025-03-07T23:12:07.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46192025-03-07T23:12:07.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46202025-03-07T23:12:07.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46212025-03-07T23:12:07.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46222025-03-07T23:12:07.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
46232025-03-07T23:12:07.273ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 uri = /v1/system/ip-pools
46242025-03-07T23:12:07.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = IpPoolList uri = /v1/system/ip-pools
46252025-03-07T23:12:07.274ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
46262025-03-07T23:12:07.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = Database uri = /v1/system/ip-pools
46272025-03-07T23:12:07.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
46282025-03-07T23:12:07.275ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = Database result = Ok(()) uri = /v1/system/ip-pools
46292025-03-07T23:12:07.305ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
46302025-03-07T23:12:07.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
46312025-03-07T23:12:07.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = Database uri = /v1/system/ip-pools
46322025-03-07T23:12:07.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
46332025-03-07T23:12:07.311ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 resource = Database result = Ok(()) uri = /v1/system/ip-pools
46342025-03-07T23:12:07.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
46352025-03-07T23:12:07.322ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 109226 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bbac071b-7725-4f43-94cf-8e6b9554a1c0 response_code = 201 uri = /v1/system/ip-pools
46362025-03-07T23:12:07.323ZINFOtest_unauthorized (external client test context): client received response status = 201
46372025-03-07T23:12:07.323ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
46382025-03-07T23:12:07.323ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 uri = /v1/system/ip-pools/default/ranges/add
46392025-03-07T23:12:07.323ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 uri = /v1/system/ip-pools/default/ranges/add
46402025-03-07T23:12:07.326ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges/add
46412025-03-07T23:12:07.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46422025-03-07T23:12:07.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46432025-03-07T23:12:07.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46442025-03-07T23:12:07.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46452025-03-07T23:12:07.329ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46462025-03-07T23:12:07.330ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46472025-03-07T23:12:07.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
46482025-03-07T23:12:07.333ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46492025-03-07T23:12:07.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46502025-03-07T23:12:07.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46512025-03-07T23:12:07.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46522025-03-07T23:12:07.347ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46532025-03-07T23:12:07.348ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46542025-03-07T23:12:07.348ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46552025-03-07T23:12:07.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46562025-03-07T23:12:07.367ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46572025-03-07T23:12:07.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
46582025-03-07T23:12:07.367ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46592025-03-07T23:12:07.367ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46602025-03-07T23:12:07.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46612025-03-07T23:12:07.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
46622025-03-07T23:12:07.371ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46632025-03-07T23:12:07.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46642025-03-07T23:12:07.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46652025-03-07T23:12:07.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46662025-03-07T23:12:07.374ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46672025-03-07T23:12:07.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46682025-03-07T23:12:07.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46692025-03-07T23:12:07.375ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46702025-03-07T23:12:07.377ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46712025-03-07T23:12:07.380ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
46722025-03-07T23:12:07.382ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 uri = /v1/system/ip-pools/default/ranges/add
46732025-03-07T23:12:07.382ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46742025-03-07T23:12:07.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46752025-03-07T23:12:07.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46762025-03-07T23:12:07.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
46772025-03-07T23:12:07.395ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
46782025-03-07T23:12:07.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46792025-03-07T23:12:07.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46802025-03-07T23:12:07.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46812025-03-07T23:12:07.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
46822025-03-07T23:12:07.403ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46832025-03-07T23:12:07.404ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46842025-03-07T23:12:07.404ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46852025-03-07T23:12:07.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46862025-03-07T23:12:07.407ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46872025-03-07T23:12:07.407ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46882025-03-07T23:12:07.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46892025-03-07T23:12:07.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
46902025-03-07T23:12:07.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
46912025-03-07T23:12:07.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46922025-03-07T23:12:07.409ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46932025-03-07T23:12:07.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46942025-03-07T23:12:07.413ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
46952025-03-07T23:12:07.418ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46962025-03-07T23:12:07.436ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 113604 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17b2c0b2-8ffa-4242-b45d-e548f33793e1 response_code = 201 uri = /v1/system/ip-pools/default/ranges/add
46972025-03-07T23:12:07.437ZINFOtest_unauthorized (external client test context): client received response status = 201
46982025-03-07T23:12:07.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
46992025-03-07T23:12:07.439ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 uri = /v1/system/ip-pools/default/silos
47002025-03-07T23:12:07.439ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 uri = /v1/system/ip-pools/default/silos
47012025-03-07T23:12:07.439ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
47022025-03-07T23:12:07.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47032025-03-07T23:12:07.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47042025-03-07T23:12:07.440ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47052025-03-07T23:12:07.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47062025-03-07T23:12:07.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47072025-03-07T23:12:07.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47082025-03-07T23:12:07.446ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
47092025-03-07T23:12:07.447ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47102025-03-07T23:12:07.447ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47112025-03-07T23:12:07.447ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47122025-03-07T23:12:07.447ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47132025-03-07T23:12:07.450ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47142025-03-07T23:12:07.451ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47152025-03-07T23:12:07.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47162025-03-07T23:12:07.451ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47172025-03-07T23:12:07.453ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
47182025-03-07T23:12:07.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
47192025-03-07T23:12:07.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47202025-03-07T23:12:07.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47212025-03-07T23:12:07.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47222025-03-07T23:12:07.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
47232025-03-07T23:12:07.458ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47242025-03-07T23:12:07.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47252025-03-07T23:12:07.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47262025-03-07T23:12:07.459ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47272025-03-07T23:12:07.461ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47282025-03-07T23:12:07.461ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47292025-03-07T23:12:07.461ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47302025-03-07T23:12:07.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47312025-03-07T23:12:07.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
47322025-03-07T23:12:07.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
47332025-03-07T23:12:07.471ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 uri = /v1/system/ip-pools/default/silos
47342025-03-07T23:12:07.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47352025-03-07T23:12:07.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47362025-03-07T23:12:07.471ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47372025-03-07T23:12:07.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
47382025-03-07T23:12:07.475ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47392025-03-07T23:12:07.475ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47402025-03-07T23:12:07.475ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47412025-03-07T23:12:07.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47422025-03-07T23:12:07.495ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47432025-03-07T23:12:07.503ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
47442025-03-07T23:12:07.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47452025-03-07T23:12:07.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47462025-03-07T23:12:07.504ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47472025-03-07T23:12:07.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47482025-03-07T23:12:07.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47492025-03-07T23:12:07.512ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47502025-03-07T23:12:07.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/system/ip-pools/default/silos
47512025-03-07T23:12:07.512ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/ip-pools/default/silos
47522025-03-07T23:12:07.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47532025-03-07T23:12:07.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47542025-03-07T23:12:07.515ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47552025-03-07T23:12:07.518ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47562025-03-07T23:12:07.518ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47572025-03-07T23:12:07.518ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47582025-03-07T23:12:07.519ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47592025-03-07T23:12:07.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47602025-03-07T23:12:07.524ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/system/ip-pools/default/silos
47612025-03-07T23:12:07.525ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = IpPoolList uri = /v1/system/ip-pools/default/silos
47622025-03-07T23:12:07.525ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47632025-03-07T23:12:07.525ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47642025-03-07T23:12:07.525ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47652025-03-07T23:12:07.525ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47662025-03-07T23:12:07.537ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47672025-03-07T23:12:07.544ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools/default/silos
47682025-03-07T23:12:07.544ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database uri = /v1/system/ip-pools/default/silos
47692025-03-07T23:12:07.544ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47702025-03-07T23:12:07.545ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47712025-03-07T23:12:07.563ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 124057 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c470448-d1a8-4ce7-a58c-05b98f8f7827 response_code = 201 uri = /v1/system/ip-pools/default/silos
47722025-03-07T23:12:07.564ZINFOtest_unauthorized (external client test context): client received response status = 201
47732025-03-07T23:12:07.565ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects
47742025-03-07T23:12:07.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd uri = /v1/projects
47752025-03-07T23:12:07.566ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd uri = /v1/projects
47762025-03-07T23:12:07.566ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
47772025-03-07T23:12:07.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47782025-03-07T23:12:07.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47792025-03-07T23:12:07.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47802025-03-07T23:12:07.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
47812025-03-07T23:12:07.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47822025-03-07T23:12:07.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b1f693e6-7682-4ebf-b07f-d7da16353eec uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47832025-03-07T23:12:07.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b1f693e6-7682-4ebf-b07f-d7da16353eec resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47842025-03-07T23:12:07.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b1f693e6-7682-4ebf-b07f-d7da16353eec roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47852025-03-07T23:12:07.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b1f693e6-7682-4ebf-b07f-d7da16353eec resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47862025-03-07T23:12:07.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47872025-03-07T23:12:07.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47882025-03-07T23:12:07.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47892025-03-07T23:12:07.578ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4956 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b1f693e6-7682-4ebf-b07f-d7da16353eec response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47902025-03-07T23:12:07.578ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1f693e6-7682-4ebf-b07f-d7da16353eec", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:07 GMT"} })
47912025-03-07T23:12:07.579ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
47922025-03-07T23:12:07.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
47932025-03-07T23:12:07.580ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47942025-03-07T23:12:07.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
47952025-03-07T23:12:07.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
47962025-03-07T23:12:07.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
47972025-03-07T23:12:07.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0331eb08-6748-4bee-933c-c13ce1be8546 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
47982025-03-07T23:12:07.582ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0331eb08-6748-4bee-933c-c13ce1be8546 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
47992025-03-07T23:12:07.582ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0331eb08-6748-4bee-933c-c13ce1be8546 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
48002025-03-07T23:12:07.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0331eb08-6748-4bee-933c-c13ce1be8546 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
48012025-03-07T23:12:07.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48022025-03-07T23:12:07.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48032025-03-07T23:12:07.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48042025-03-07T23:12:07.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48052025-03-07T23:12:07.591ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 10065 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0331eb08-6748-4bee-933c-c13ce1be8546 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
48062025-03-07T23:12:07.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48072025-03-07T23:12:07.592ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "0331eb08-6748-4bee-933c-c13ce1be8546", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:07 GMT"} })
48082025-03-07T23:12:07.592ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48092025-03-07T23:12:07.592ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48102025-03-07T23:12:07.592ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
48112025-03-07T23:12:07.593ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48122025-03-07T23:12:07.597ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
48132025-03-07T23:12:07.600ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
48142025-03-07T23:12:07.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48152025-03-07T23:12:07.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48162025-03-07T23:12:07.601ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48172025-03-07T23:12:07.602ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48182025-03-07T23:12:07.603ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48192025-03-07T23:12:07.604ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48202025-03-07T23:12:07.604ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
48212025-03-07T23:12:07.605ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
48222025-03-07T23:12:07.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
48232025-03-07T23:12:07.606ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48242025-03-07T23:12:07.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48252025-03-07T23:12:07.607ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48262025-03-07T23:12:07.610ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48272025-03-07T23:12:07.610ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48282025-03-07T23:12:07.610ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48292025-03-07T23:12:07.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48302025-03-07T23:12:07.625ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
48312025-03-07T23:12:07.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
48322025-03-07T23:12:07.629ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd uri = /v1/projects
48332025-03-07T23:12:07.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
48342025-03-07T23:12:07.630ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
48352025-03-07T23:12:07.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Database uri = /v1/projects
48362025-03-07T23:12:07.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd roles = RoleSet { roles: {} } uri = /v1/projects
48372025-03-07T23:12:07.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Database result = Ok(()) uri = /v1/projects
48382025-03-07T23:12:07.633ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
48392025-03-07T23:12:07.635ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Database uri = /v1/projects
48402025-03-07T23:12:07.635ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd roles = RoleSet { roles: {} } uri = /v1/projects
48412025-03-07T23:12:07.635ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Database result = Ok(()) uri = /v1/projects
48422025-03-07T23:12:07.637ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
48432025-03-07T23:12:07.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
48442025-03-07T23:12:07.649ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create
48452025-03-07T23:12:07.649ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"","name":"demo-project"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20} saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48462025-03-07T23:12:07.649ZINFOtest_unauthorized (SecStore): creating saga saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create
48472025-03-07T23:12:07.721ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create
48482025-03-07T23:12:07.721ZINFOtest_unauthorized (SEC): saga start saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48492025-03-07T23:12:07.721ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48502025-03-07T23:12:07.721ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48512025-03-07T23:12:07.783ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48522025-03-07T23:12:07.783ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48532025-03-07T23:12:07.789ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48542025-03-07T23:12:07.815ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48552025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48562025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48572025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48582025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48592025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48602025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48612025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48622025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48632025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48642025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48652025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48662025-03-07T23:12:07.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48672025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48682025-03-07T23:12:07.819ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = ProjectCreateRecord
48692025-03-07T23:12:07.842ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48702025-03-07T23:12:07.843ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "name": String("demo-project"), "time_created": String("2025-03-07T23:12:07.798153Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:07.798153Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48712025-03-07T23:12:07.847ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48722025-03-07T23:12:07.848ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48732025-03-07T23:12:07.853ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48742025-03-07T23:12:07.853ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd96:b432:f721::/48"), "name": String("default")}}) node_id = 1 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48752025-03-07T23:12:07.861ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48762025-03-07T23:12:07.861ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48772025-03-07T23:12:07.869ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48782025-03-07T23:12:07.869ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48792025-03-07T23:12:07.874ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48802025-03-07T23:12:07.875ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48812025-03-07T23:12:07.880ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48822025-03-07T23:12:07.880ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("2578510b-8473-479a-99f1-532dafdf88b8")) node_id = 3 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48832025-03-07T23:12:07.891ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48842025-03-07T23:12:07.891ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48852025-03-07T23:12:07.897ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48862025-03-07T23:12:07.897ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")) node_id = 4 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48872025-03-07T23:12:07.907ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48882025-03-07T23:12:07.907ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48892025-03-07T23:12:07.915ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48902025-03-07T23:12:07.918ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("c41c4b76-ba14-4b1f-96f0-f8cbbd9e01ff")) node_id = 5 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48912025-03-07T23:12:07.924ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48922025-03-07T23:12:07.924ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48932025-03-07T23:12:07.931ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48942025-03-07T23:12:07.931ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("11cf7d7d-7f68-434b-9b7b-134f01b95dbe")) node_id = 6 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48952025-03-07T23:12:07.937ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48962025-03-07T23:12:07.937ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48972025-03-07T23:12:07.942ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
48982025-03-07T23:12:07.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("29ea594c-c68d-4c1a-8a98-5d183bb041da")) node_id = 7 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
48992025-03-07T23:12:07.948ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49002025-03-07T23:12:07.948ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49012025-03-07T23:12:07.953ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49022025-03-07T23:12:07.953ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("4f79228f-8563-45f6-b35f-b99826cfcc94")) node_id = 8 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49032025-03-07T23:12:07.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49042025-03-07T23:12:07.961ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49052025-03-07T23:12:07.966ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49062025-03-07T23:12:07.967ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("8da10816-b560-4a3a-b871-ab8d72aaaf74")) node_id = 9 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49072025-03-07T23:12:07.973ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49082025-03-07T23:12:07.973ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49092025-03-07T23:12:07.978ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49102025-03-07T23:12:07.978ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49112025-03-07T23:12:07.978ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49122025-03-07T23:12:07.979ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49132025-03-07T23:12:07.980ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49142025-03-07T23:12:07.983ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49152025-03-07T23:12:07.984ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49162025-03-07T23:12:07.984ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49172025-03-07T23:12:07.984ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49182025-03-07T23:12:07.990ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49192025-03-07T23:12:07.991ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49202025-03-07T23:12:07.991ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49212025-03-07T23:12:07.991ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49222025-03-07T23:12:07.997ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49232025-03-07T23:12:08.002ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49242025-03-07T23:12:08.004ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49252025-03-07T23:12:08.004ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49262025-03-07T23:12:08.004ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateVpc
49272025-03-07T23:12:08.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49282025-03-07T23:12:08.038ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("2578510b-8473-479a-99f1-532dafdf88b8"), "name": String("default"), "time_created": String("2025-03-07T23:12:07.978665Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:07.978665Z")}, "ipv6_prefix": String("fd96:b432:f721::/48"), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "subnet_gen": Number(1), "system_router_id": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "vni": Number(4187191)}]) node_id = 10 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49292025-03-07T23:12:08.046ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49302025-03-07T23:12:08.053ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49312025-03-07T23:12:08.057ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49322025-03-07T23:12:08.057ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49332025-03-07T23:12:08.057ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49342025-03-07T23:12:08.057ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49352025-03-07T23:12:08.057ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49362025-03-07T23:12:08.062ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49372025-03-07T23:12:08.063ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49382025-03-07T23:12:08.063ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49392025-03-07T23:12:08.063ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49402025-03-07T23:12:08.065ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49412025-03-07T23:12:08.066ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49422025-03-07T23:12:08.066ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49432025-03-07T23:12:08.066ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49442025-03-07T23:12:08.069ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49452025-03-07T23:12:08.077ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49462025-03-07T23:12:08.077ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49472025-03-07T23:12:08.077ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49482025-03-07T23:12:08.078ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateRouter
49492025-03-07T23:12:08.194ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49502025-03-07T23:12:08.194ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 11 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49512025-03-07T23:12:08.210ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49522025-03-07T23:12:08.210ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49532025-03-07T23:12:08.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49542025-03-07T23:12:08.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49552025-03-07T23:12:08.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
49562025-03-07T23:12:08.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
49572025-03-07T23:12:08.225ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
49582025-03-07T23:12:08.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
49592025-03-07T23:12:08.226ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49602025-03-07T23:12:08.226ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49612025-03-07T23:12:08.226ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49622025-03-07T23:12:08.226ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49632025-03-07T23:12:08.227ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49642025-03-07T23:12:08.230ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49652025-03-07T23:12:08.231ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49662025-03-07T23:12:08.231ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49672025-03-07T23:12:08.232ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49682025-03-07T23:12:08.236ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
49692025-03-07T23:12:08.237ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49702025-03-07T23:12:08.237ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49712025-03-07T23:12:08.237ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49722025-03-07T23:12:08.238ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49732025-03-07T23:12:08.238ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49742025-03-07T23:12:08.243ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49752025-03-07T23:12:08.259ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49762025-03-07T23:12:08.264ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49772025-03-07T23:12:08.264ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49782025-03-07T23:12:08.267ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV4Route
49792025-03-07T23:12:08.298ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49802025-03-07T23:12:08.298ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49812025-03-07T23:12:08.306ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
49822025-03-07T23:12:08.308ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
49832025-03-07T23:12:08.312ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49842025-03-07T23:12:08.313ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49852025-03-07T23:12:08.314ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49862025-03-07T23:12:08.314ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49872025-03-07T23:12:08.314ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49882025-03-07T23:12:08.317ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49892025-03-07T23:12:08.317ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49902025-03-07T23:12:08.317ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49912025-03-07T23:12:08.317ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49922025-03-07T23:12:08.319ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
49932025-03-07T23:12:08.320ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49942025-03-07T23:12:08.320ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49952025-03-07T23:12:08.320ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49962025-03-07T23:12:08.320ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49972025-03-07T23:12:08.324ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49982025-03-07T23:12:08.331ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
49992025-03-07T23:12:08.331ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
50002025-03-07T23:12:08.331ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
50012025-03-07T23:12:08.331ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateV6Route
50022025-03-07T23:12:08.347ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50032025-03-07T23:12:08.351ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50042025-03-07T23:12:08.357ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50052025-03-07T23:12:08.357ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50062025-03-07T23:12:08.365ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50072025-03-07T23:12:08.365ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50082025-03-07T23:12:08.368ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50092025-03-07T23:12:08.368ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50102025-03-07T23:12:08.368ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50112025-03-07T23:12:08.383ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50122025-03-07T23:12:08.388ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50132025-03-07T23:12:08.388ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50142025-03-07T23:12:08.388ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50152025-03-07T23:12:08.388ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50162025-03-07T23:12:08.388ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50172025-03-07T23:12:08.388ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50182025-03-07T23:12:08.388ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50192025-03-07T23:12:08.390ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50202025-03-07T23:12:08.406ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnet
50212025-03-07T23:12:08.431ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50222025-03-07T23:12:08.431ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "name": String("default"), "time_created": String("2025-03-07T23:12:08.365230Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.365230Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd96:b432:f721::/64"), "rcgen": Number(1), "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}]) node_id = 14 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50232025-03-07T23:12:08.440ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50242025-03-07T23:12:08.440ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50252025-03-07T23:12:08.449ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50262025-03-07T23:12:08.450ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50272025-03-07T23:12:08.451ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50282025-03-07T23:12:08.451ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50292025-03-07T23:12:08.451ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50302025-03-07T23:12:08.455ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50312025-03-07T23:12:08.455ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50322025-03-07T23:12:08.456ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50332025-03-07T23:12:08.457ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50342025-03-07T23:12:08.459ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50352025-03-07T23:12:08.461ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50362025-03-07T23:12:08.461ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50372025-03-07T23:12:08.461ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50382025-03-07T23:12:08.466ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50392025-03-07T23:12:08.484ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50402025-03-07T23:12:08.484ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50412025-03-07T23:12:08.484ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50422025-03-07T23:12:08.486ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateSubnetRoute
50432025-03-07T23:12:08.509ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50442025-03-07T23:12:08.510ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("29ea594c-c68d-4c1a-8a98-5d183bb041da"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 15 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50452025-03-07T23:12:08.522ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50462025-03-07T23:12:08.523ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50472025-03-07T23:12:08.534ZDEBGtest_unauthorized (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: a0fcef07-a328-4afe-862a-a4280c819345, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-07T23:12:08.533953068Z, time_modified: 2025-03-07T23:12:08.533953068Z, time_deleted: None }, vpc_id: 2578510b-8473-479a-99f1-532dafdf88b8, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 9711c1c5-87d8-4abc-b7eb-ba860ac65477, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-07T23:12:08.533975988Z, time_modified: 2025-03-07T23:12:08.533975988Z, time_deleted: None }, vpc_id: 2578510b-8473-479a-99f1-532dafdf88b8, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 5f463b00-5630-4f8d-b956-c7a3e441d78e, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-07T23:12:08.533989658Z, time_modified: 2025-03-07T23:12:08.533989658Z, time_deleted: None }, vpc_id: 2578510b-8473-479a-99f1-532dafdf88b8, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
50482025-03-07T23:12:08.534ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50492025-03-07T23:12:08.536ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50502025-03-07T23:12:08.536ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50512025-03-07T23:12:08.536ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50522025-03-07T23:12:08.536ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50532025-03-07T23:12:08.539ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50542025-03-07T23:12:08.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50552025-03-07T23:12:08.539ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50562025-03-07T23:12:08.540ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50572025-03-07T23:12:08.556ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50582025-03-07T23:12:08.557ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50592025-03-07T23:12:08.557ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50602025-03-07T23:12:08.565ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50612025-03-07T23:12:08.586ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50622025-03-07T23:12:08.594ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50632025-03-07T23:12:08.607ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50642025-03-07T23:12:08.607ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50652025-03-07T23:12:08.611ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcUpdateFirewall
50662025-03-07T23:12:08.612ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50672025-03-07T23:12:08.612ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50682025-03-07T23:12:08.615ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50692025-03-07T23:12:08.616ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50702025-03-07T23:12:08.616ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50712025-03-07T23:12:08.617ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50722025-03-07T23:12:08.822ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50732025-03-07T23:12:08.823ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("a0fcef07-a328-4afe-862a-a4280c819345"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:08.533953068Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533953068Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("9711c1c5-87d8-4abc-b7eb-ba860ac65477"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:08.533975988Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533975988Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("5f463b00-5630-4f8d-b956-c7a3e441d78e"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:08.533989658Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533989658Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}]) node_id = 16 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50742025-03-07T23:12:08.832ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
50752025-03-07T23:12:08.832ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
50762025-03-07T23:12:08.844ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50772025-03-07T23:12:08.846ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50782025-03-07T23:12:08.846ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50792025-03-07T23:12:08.846ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50802025-03-07T23:12:08.846ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50812025-03-07T23:12:08.849ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50822025-03-07T23:12:08.849ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50832025-03-07T23:12:08.849ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50842025-03-07T23:12:08.850ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50852025-03-07T23:12:08.853ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50862025-03-07T23:12:08.853ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50872025-03-07T23:12:08.854ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50882025-03-07T23:12:08.855ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50892025-03-07T23:12:08.859ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50902025-03-07T23:12:08.867ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50912025-03-07T23:12:08.868ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50922025-03-07T23:12:08.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50932025-03-07T23:12:08.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50942025-03-07T23:12:08.878ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50952025-03-07T23:12:08.878ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50962025-03-07T23:12:08.880ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50972025-03-07T23:12:08.891ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50982025-03-07T23:12:08.892ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
50992025-03-07T23:12:08.894ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51002025-03-07T23:12:08.898ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ById(8da10816-b560-4a3a-b871-ab8d72aaaf74) } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51012025-03-07T23:12:08.898ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51022025-03-07T23:12:08.898ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51032025-03-07T23:12:08.898ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51042025-03-07T23:12:08.899ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51052025-03-07T23:12:08.907ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51062025-03-07T23:12:08.908ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51072025-03-07T23:12:08.908ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51082025-03-07T23:12:08.908ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51092025-03-07T23:12:08.927ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51102025-03-07T23:12:08.930ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51112025-03-07T23:12:08.930ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51122025-03-07T23:12:08.930ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51132025-03-07T23:12:08.934ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51142025-03-07T23:12:08.941ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ById(8da10816-b560-4a3a-b871-ab8d72aaaf74) } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51152025-03-07T23:12:08.941ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51162025-03-07T23:12:08.941ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51172025-03-07T23:12:08.942ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcCreateGateway
51182025-03-07T23:12:08.955ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51192025-03-07T23:12:08.955ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("8da10816-b560-4a3a-b871-ab8d72aaaf74"), "lookup_type": Object {"ById": String("8da10816-b560-4a3a-b871-ab8d72aaaf74")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 17 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51202025-03-07T23:12:08.964ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51212025-03-07T23:12:08.964ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51222025-03-07T23:12:08.971ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51232025-03-07T23:12:08.972ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51242025-03-07T23:12:08.972ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51252025-03-07T23:12:08.974ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51262025-03-07T23:12:08.974ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51272025-03-07T23:12:08.974ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51282025-03-07T23:12:08.976ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51292025-03-07T23:12:08.976ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51302025-03-07T23:12:08.976ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51312025-03-07T23:12:08.984ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51322025-03-07T23:12:08.985ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51332025-03-07T23:12:08.985ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51342025-03-07T23:12:08.985ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51352025-03-07T23:12:08.985ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51362025-03-07T23:12:08.988ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51372025-03-07T23:12:08.988ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51382025-03-07T23:12:08.988ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51392025-03-07T23:12:08.989ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51402025-03-07T23:12:08.991ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51412025-03-07T23:12:08.992ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51422025-03-07T23:12:08.992ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51432025-03-07T23:12:08.992ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51442025-03-07T23:12:08.995ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51452025-03-07T23:12:09.014ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51462025-03-07T23:12:09.015ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51472025-03-07T23:12:09.016ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51482025-03-07T23:12:09.016ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51492025-03-07T23:12:09.016ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51502025-03-07T23:12:09.017ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51512025-03-07T23:12:09.037ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51522025-03-07T23:12:09.037ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51532025-03-07T23:12:09.037ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51542025-03-07T23:12:09.038ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51552025-03-07T23:12:09.042ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51562025-03-07T23:12:09.042ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51572025-03-07T23:12:09.042ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51582025-03-07T23:12:09.043ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51592025-03-07T23:12:09.046ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51602025-03-07T23:12:09.052ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51612025-03-07T23:12:09.052ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51622025-03-07T23:12:09.052ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51632025-03-07T23:12:09.053ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51642025-03-07T23:12:09.067ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
51652025-03-07T23:12:09.067ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = []
51662025-03-07T23:12:09.068ZDEBGtest_unauthorized (nexus): resolved 0 rules for sleds
51672025-03-07T23:12:09.115ZDEBGtest_unauthorized (nexus): resolved sleds for vpc default vpc_to_sled = []
51682025-03-07T23:12:09.115ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
51692025-03-07T23:12:09.115ZINFOtest_unauthorized (nexus): updated firewall rules on 0 sleds
51702025-03-07T23:12:09.115ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51712025-03-07T23:12:09.115ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51722025-03-07T23:12:09.116ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_node = VpcNotifySleds
51732025-03-07T23:12:09.122ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51742025-03-07T23:12:09.123ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51752025-03-07T23:12:09.128ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51762025-03-07T23:12:09.128ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51772025-03-07T23:12:09.132ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51782025-03-07T23:12:09.133ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51792025-03-07T23:12:09.138ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51802025-03-07T23:12:09.138ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51812025-03-07T23:12:09.144ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51822025-03-07T23:12:09.144ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51832025-03-07T23:12:09.150ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 794ea450-2955-4143-8826-bf0661dd38ad sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51842025-03-07T23:12:09.150ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 794ea450-2955-4143-8826-bf0661dd38ad
51852025-03-07T23:12:09.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
51862025-03-07T23:12:09.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
51872025-03-07T23:12:09.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
51882025-03-07T23:12:09.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
51892025-03-07T23:12:09.224ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
51902025-03-07T23:12:09.224ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
51912025-03-07T23:12:09.241ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
51922025-03-07T23:12:09.241ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 794ea450-2955-4143-8826-bf0661dd38ad saga_name = project-create saga_result = SagaResult { saga_id: 794ea450-2955-4143-8826-bf0661dd38ad, saga_log: SagaLog { saga_id: 794ea450-2955-4143-8826-bf0661dd38ad, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "name": String("demo-project"), "time_created": String("2025-03-07T23:12:07.798153Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:07.798153Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd96:b432:f721::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("2578510b-8473-479a-99f1-532dafdf88b8")), 4: Succeeded(String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")), 5: Succeeded(String("c41c4b76-ba14-4b1f-96f0-f8cbbd9e01ff")), 6: Succeeded(String("11cf7d7d-7f68-434b-9b7b-134f01b95dbe")), 7: Succeeded(String("29ea594c-c68d-4c1a-8a98-5d183bb041da")), 8: Succeeded(String("4f79228f-8563-45f6-b35f-b99826cfcc94")), 9: Succeeded(String("8da10816-b560-4a3a-b871-ab8d72aaaf74")), 10: Succeeded(Array [Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("2578510b-8473-479a-99f1-532dafdf88b8"), "name": String("default"), "time_created": String("2025-03-07T23:12:07.978665Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:07.978665Z")}, "ipv6_prefix": String("fd96:b432:f721::/48"), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "subnet_gen": Number(1), "system_router_id": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "vni": Number(4187191)}]), 11: Succeeded(Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "name": String("default"), "time_created": String("2025-03-07T23:12:08.365230Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.365230Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd96:b432:f721::/64"), "rcgen": Number(1), "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}]), 15: Succeeded(Object {"key": String("29ea594c-c68d-4c1a-8a98-5d183bb041da"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("a0fcef07-a328-4afe-862a-a4280c819345"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:08.533953068Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533953068Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("9711c1c5-87d8-4abc-b7eb-ba860ac65477"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:08.533975988Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533975988Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("5f463b00-5630-4f8d-b956-c7a3e441d78e"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:08.533989658Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533989658Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}]), 17: Succeeded(Object {"key": String("8da10816-b560-4a3a-b871-ab8d72aaaf74"), "lookup_type": Object {"ById": String("8da10816-b560-4a3a-b871-ab8d72aaaf74")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("8da10816-b560-4a3a-b871-ab8d72aaaf74"), "default_subnet_id": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "default_v4_route_id": String("c41c4b76-ba14-4b1f-96f0-f8cbbd9e01ff"), "default_v6_route_id": String("11cf7d7d-7f68-434b-9b7b-134f01b95dbe"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("a0fcef07-a328-4afe-862a-a4280c819345"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:08.533953068Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533953068Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("9711c1c5-87d8-4abc-b7eb-ba860ac65477"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:08.533975988Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533975988Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("5f463b00-5630-4f8d-b956-c7a3e441d78e"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:08.533989658Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.533989658Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}], "gateway": Object {"key": String("8da10816-b560-4a3a-b871-ab8d72aaaf74"), "lookup_type": Object {"ById": String("8da10816-b560-4a3a-b871-ab8d72aaaf74")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "name": String("demo-project"), "time_created": String("2025-03-07T23:12:07.798153Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:07.798153Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("29ea594c-c68d-4c1a-8a98-5d183bb041da"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "lookup_type": Object {"ById": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "lookup_type": Object {"ById": String("4f79228f-8563-45f6-b35f-b99826cfcc94")}, "parent": Object {"key": String("2578510b-8473-479a-99f1-532dafdf88b8"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("4f79228f-8563-45f6-b35f-b99826cfcc94"), "name": String("default"), "time_created": String("2025-03-07T23:12:08.365230Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:08.365230Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd96:b432:f721::/64"), "rcgen": Number(1), "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")}], "subnet_route_id": String("29ea594c-c68d-4c1a-8a98-5d183bb041da"), "system_router_id": String("ee83adeb-389f-4e4b-93ed-ff6d673abfc3"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd96:b432:f721::/48"), "name": String("default")}}, "vpc_id": String("2578510b-8473-479a-99f1-532dafdf88b8")} }) }
51932025-03-07T23:12:09.241ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1673742 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60ff95e6-382f-4a8e-96d6-3b07b80a52bd response_code = 201 uri = /v1/projects
51942025-03-07T23:12:09.241ZINFOtest_unauthorized (external client test context): client received response status = 201
51952025-03-07T23:12:09.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
51962025-03-07T23:12:09.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e uri = /v1/vpcs?project=demo-project
51972025-03-07T23:12:09.242ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e uri = /v1/vpcs?project=demo-project
51982025-03-07T23:12:09.242ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
51992025-03-07T23:12:09.242ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52002025-03-07T23:12:09.242ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52012025-03-07T23:12:09.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52022025-03-07T23:12:09.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52032025-03-07T23:12:09.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52042025-03-07T23:12:09.245ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52052025-03-07T23:12:09.247ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
52062025-03-07T23:12:09.247ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
52072025-03-07T23:12:09.247ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52082025-03-07T23:12:09.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52092025-03-07T23:12:09.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52102025-03-07T23:12:09.257ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
52112025-03-07T23:12:09.257ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
52122025-03-07T23:12:09.257ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52132025-03-07T23:12:09.258ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52142025-03-07T23:12:09.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52152025-03-07T23:12:09.258ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52162025-03-07T23:12:09.260ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
52172025-03-07T23:12:09.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
52182025-03-07T23:12:09.265ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52192025-03-07T23:12:09.265ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52202025-03-07T23:12:09.265ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52212025-03-07T23:12:09.266ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
52222025-03-07T23:12:09.266ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
52232025-03-07T23:12:09.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52242025-03-07T23:12:09.268ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52252025-03-07T23:12:09.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52262025-03-07T23:12:09.270ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52272025-03-07T23:12:09.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52282025-03-07T23:12:09.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52292025-03-07T23:12:09.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52302025-03-07T23:12:09.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
52312025-03-07T23:12:09.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
52322025-03-07T23:12:09.277ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e uri = /v1/vpcs?project=demo-project
52332025-03-07T23:12:09.277ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52342025-03-07T23:12:09.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52352025-03-07T23:12:09.278ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52362025-03-07T23:12:09.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52372025-03-07T23:12:09.280ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52382025-03-07T23:12:09.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52392025-03-07T23:12:09.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
52402025-03-07T23:12:09.283ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
52412025-03-07T23:12:09.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52422025-03-07T23:12:09.283ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52432025-03-07T23:12:09.284ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52442025-03-07T23:12:09.287ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
52452025-03-07T23:12:09.287ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52462025-03-07T23:12:09.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52472025-03-07T23:12:09.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52482025-03-07T23:12:09.290ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
52492025-03-07T23:12:09.291ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52502025-03-07T23:12:09.291ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52512025-03-07T23:12:09.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52522025-03-07T23:12:09.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
52532025-03-07T23:12:09.309ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
52542025-03-07T23:12:09.309ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
52552025-03-07T23:12:09.309ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
52562025-03-07T23:12:09.309ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52572025-03-07T23:12:09.309ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52582025-03-07T23:12:09.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52592025-03-07T23:12:09.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
52602025-03-07T23:12:09.323ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
52612025-03-07T23:12:09.324ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52622025-03-07T23:12:09.324ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52632025-03-07T23:12:09.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52642025-03-07T23:12:09.329ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
52652025-03-07T23:12:09.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database uri = /v1/vpcs?project=demo-project
52662025-03-07T23:12:09.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52672025-03-07T23:12:09.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52682025-03-07T23:12:09.333ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
52692025-03-07T23:12:09.341ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
52702025-03-07T23:12:09.342ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create
52712025-03-07T23:12:09.343ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":17,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[16,0,null],[15,17,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"Start":{"params":{"authz_project":{"key":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","lookup_type":{"ByName":"demo-project"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"vpc_create":{"description":"","dns_name":"demo-vpc","ipv6_prefix":null,"name":"demo-vpc"}}}},"End"]},"saga_name":"vpc-create","start_node":16} saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52722025-03-07T23:12:09.343ZINFOtest_unauthorized (SecStore): creating saga saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create
52732025-03-07T23:12:09.361ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create
52742025-03-07T23:12:09.361ZINFOtest_unauthorized (SEC): saga start saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52752025-03-07T23:12:09.362ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52762025-03-07T23:12:09.362ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52772025-03-07T23:12:09.378ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52782025-03-07T23:12:09.378ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52792025-03-07T23:12:09.383ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52802025-03-07T23:12:09.383ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52812025-03-07T23:12:09.388ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52822025-03-07T23:12:09.388ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("fc680bc2-be0e-46b0-b793-b590e88c148c")) node_id = 0 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52832025-03-07T23:12:09.394ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52842025-03-07T23:12:09.394ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52852025-03-07T23:12:09.400ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52862025-03-07T23:12:09.400ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")) node_id = 1 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52872025-03-07T23:12:09.405ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52882025-03-07T23:12:09.405ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52892025-03-07T23:12:09.410ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52902025-03-07T23:12:09.410ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("b5ca99d3-42f7-4eb8-9b04-1a0768a030a4")) node_id = 2 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52912025-03-07T23:12:09.415ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52922025-03-07T23:12:09.415ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52932025-03-07T23:12:09.420ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52942025-03-07T23:12:09.420ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("c0849238-95c0-420f-8830-6e811e32f9a3")) node_id = 3 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52952025-03-07T23:12:09.426ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52962025-03-07T23:12:09.426ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52972025-03-07T23:12:09.435ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
52982025-03-07T23:12:09.435ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("97fe4b96-a082-4885-8fa1-be124bae06e2")) node_id = 4 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
52992025-03-07T23:12:09.440ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53002025-03-07T23:12:09.441ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53012025-03-07T23:12:09.446ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53022025-03-07T23:12:09.446ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("06aacce2-dcd7-43d4-8720-485fd6c33cae")) node_id = 5 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53032025-03-07T23:12:09.455ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53042025-03-07T23:12:09.455ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53052025-03-07T23:12:09.461ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53062025-03-07T23:12:09.461ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e")) node_id = 6 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53072025-03-07T23:12:09.466ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53082025-03-07T23:12:09.466ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53092025-03-07T23:12:09.474ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53102025-03-07T23:12:09.474ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53112025-03-07T23:12:09.474ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53122025-03-07T23:12:09.474ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53132025-03-07T23:12:09.474ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53142025-03-07T23:12:09.479ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53152025-03-07T23:12:09.479ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53162025-03-07T23:12:09.479ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53172025-03-07T23:12:09.479ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53182025-03-07T23:12:09.482ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53192025-03-07T23:12:09.483ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53202025-03-07T23:12:09.483ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53212025-03-07T23:12:09.484ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53222025-03-07T23:12:09.489ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53232025-03-07T23:12:09.491ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53242025-03-07T23:12:09.491ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53252025-03-07T23:12:09.491ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53262025-03-07T23:12:09.492ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateVpc
53272025-03-07T23:12:09.508ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53282025-03-07T23:12:09.508ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:12:09.472846Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.472846Z")}, "ipv6_prefix": String("fd0d:5baa:64a9::/48"), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "subnet_gen": Number(1), "system_router_id": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "vni": Number(7936547)}]) node_id = 7 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53292025-03-07T23:12:09.519ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53302025-03-07T23:12:09.519ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53312025-03-07T23:12:09.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53322025-03-07T23:12:09.539ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53332025-03-07T23:12:09.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53342025-03-07T23:12:09.539ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53352025-03-07T23:12:09.539ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53362025-03-07T23:12:09.543ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53372025-03-07T23:12:09.543ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53382025-03-07T23:12:09.543ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53392025-03-07T23:12:09.543ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53402025-03-07T23:12:09.547ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53412025-03-07T23:12:09.547ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53422025-03-07T23:12:09.547ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53432025-03-07T23:12:09.547ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53442025-03-07T23:12:09.555ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53452025-03-07T23:12:09.560ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53462025-03-07T23:12:09.560ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53472025-03-07T23:12:09.560ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53482025-03-07T23:12:09.561ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateRouter
53492025-03-07T23:12:09.568ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53502025-03-07T23:12:09.568ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 8 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53512025-03-07T23:12:09.574ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
53522025-03-07T23:12:09.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53532025-03-07T23:12:09.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 9456784a-cf6a-4064-923e-21559dd3dd85 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53542025-03-07T23:12:09.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 9456784a-cf6a-4064-923e-21559dd3dd85 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53552025-03-07T23:12:09.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 9456784a-cf6a-4064-923e-21559dd3dd85 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53562025-03-07T23:12:09.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 9456784a-cf6a-4064-923e-21559dd3dd85 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53572025-03-07T23:12:09.577ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53582025-03-07T23:12:09.577ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53592025-03-07T23:12:09.580ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6421 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 9456784a-cf6a-4064-923e-21559dd3dd85 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
53602025-03-07T23:12:09.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "9456784a-cf6a-4064-923e-21559dd3dd85", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:08 GMT"} })
53612025-03-07T23:12:09.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53622025-03-07T23:12:09.580ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ec32bd01-307d-42bc-ba52-e40c3272408f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53632025-03-07T23:12:09.581ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ec32bd01-307d-42bc-ba52-e40c3272408f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53642025-03-07T23:12:09.582ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ec32bd01-307d-42bc-ba52-e40c3272408f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53652025-03-07T23:12:09.582ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ec32bd01-307d-42bc-ba52-e40c3272408f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53662025-03-07T23:12:09.583ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3317 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ec32bd01-307d-42bc-ba52-e40c3272408f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
53672025-03-07T23:12:09.584ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec32bd01-307d-42bc-ba52-e40c3272408f", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:08 GMT"} })
53682025-03-07T23:12:09.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53692025-03-07T23:12:09.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53702025-03-07T23:12:09.584ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
53712025-03-07T23:12:09.585ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53722025-03-07T23:12:09.586ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53732025-03-07T23:12:09.586ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53742025-03-07T23:12:09.586ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53752025-03-07T23:12:09.586ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53762025-03-07T23:12:09.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53772025-03-07T23:12:09.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53782025-03-07T23:12:09.589ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53792025-03-07T23:12:09.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53802025-03-07T23:12:09.590ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53812025-03-07T23:12:09.590ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53822025-03-07T23:12:09.591ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53832025-03-07T23:12:09.591ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53842025-03-07T23:12:09.591ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53852025-03-07T23:12:09.592ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53862025-03-07T23:12:09.597ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53872025-03-07T23:12:09.598ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53882025-03-07T23:12:09.598ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53892025-03-07T23:12:09.598ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53902025-03-07T23:12:09.601ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53912025-03-07T23:12:09.613ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53922025-03-07T23:12:09.614ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53932025-03-07T23:12:09.615ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53942025-03-07T23:12:09.615ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV4Route
53952025-03-07T23:12:09.631ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53962025-03-07T23:12:09.633ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53972025-03-07T23:12:09.640ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
53982025-03-07T23:12:09.641ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
53992025-03-07T23:12:09.653ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54002025-03-07T23:12:09.654ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54012025-03-07T23:12:09.654ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54022025-03-07T23:12:09.654ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54032025-03-07T23:12:09.654ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54042025-03-07T23:12:09.657ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54052025-03-07T23:12:09.657ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54062025-03-07T23:12:09.657ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54072025-03-07T23:12:09.658ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54082025-03-07T23:12:09.661ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54092025-03-07T23:12:09.662ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54102025-03-07T23:12:09.662ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54112025-03-07T23:12:09.662ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54122025-03-07T23:12:09.671ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54132025-03-07T23:12:09.678ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54142025-03-07T23:12:09.678ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54152025-03-07T23:12:09.678ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54162025-03-07T23:12:09.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateV6Route
54172025-03-07T23:12:09.698ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54182025-03-07T23:12:09.698ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54192025-03-07T23:12:09.705ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54202025-03-07T23:12:09.706ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54212025-03-07T23:12:09.714ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54222025-03-07T23:12:09.714ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54232025-03-07T23:12:09.714ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54242025-03-07T23:12:09.714ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54252025-03-07T23:12:09.716ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54262025-03-07T23:12:09.719ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54272025-03-07T23:12:09.719ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54282025-03-07T23:12:09.719ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54292025-03-07T23:12:09.721ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54302025-03-07T23:12:09.728ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54312025-03-07T23:12:09.728ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54322025-03-07T23:12:09.729ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54332025-03-07T23:12:09.730ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54342025-03-07T23:12:09.736ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54352025-03-07T23:12:09.749ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnet
54362025-03-07T23:12:09.760ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54372025-03-07T23:12:09.760ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "name": String("default"), "time_created": String("2025-03-07T23:12:09.714375Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.714375Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0d:5baa:64a9::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]) node_id = 11 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54382025-03-07T23:12:09.809ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54392025-03-07T23:12:09.809ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54402025-03-07T23:12:09.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54412025-03-07T23:12:09.819ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54422025-03-07T23:12:09.819ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54432025-03-07T23:12:09.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54442025-03-07T23:12:09.820ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54452025-03-07T23:12:09.831ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54462025-03-07T23:12:09.831ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54472025-03-07T23:12:09.832ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54482025-03-07T23:12:09.832ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54492025-03-07T23:12:09.852ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54502025-03-07T23:12:09.852ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54512025-03-07T23:12:09.852ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54522025-03-07T23:12:09.853ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54532025-03-07T23:12:09.869ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54542025-03-07T23:12:09.884ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54552025-03-07T23:12:09.884ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54562025-03-07T23:12:09.885ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54572025-03-07T23:12:09.885ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54582025-03-07T23:12:09.899ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54592025-03-07T23:12:09.900ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("97fe4b96-a082-4885-8fa1-be124bae06e2"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 12 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54602025-03-07T23:12:09.909ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54612025-03-07T23:12:09.913ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54622025-03-07T23:12:09.920ZDEBGtest_unauthorized (nexus): default firewall rules for vpc demo-vpc rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 2932c1b7-f405-4b5d-991e-3f758ceb382e, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-07T23:12:09.919238922Z, time_modified: 2025-03-07T23:12:09.919238922Z, time_deleted: None }, vpc_id: fc680bc2-be0e-46b0-b793-b590e88c148c, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("demo-vpc")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: c729cadc-2166-4931-8368-c65ca0a4074b, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-07T23:12:09.919260713Z, time_modified: 2025-03-07T23:12:09.919260713Z, time_deleted: None }, vpc_id: fc680bc2-be0e-46b0-b793-b590e88c148c, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 0ab5d791-443a-4f03-9157-d27804069af1, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-07T23:12:09.919274054Z, time_modified: 2025-03-07T23:12:09.919274054Z, time_deleted: None }, vpc_id: fc680bc2-be0e-46b0-b793-b590e88c148c, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
54632025-03-07T23:12:09.920ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54642025-03-07T23:12:09.920ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54652025-03-07T23:12:09.920ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54662025-03-07T23:12:09.920ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54672025-03-07T23:12:09.920ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54682025-03-07T23:12:09.924ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54692025-03-07T23:12:09.926ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54702025-03-07T23:12:09.926ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54712025-03-07T23:12:09.926ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54722025-03-07T23:12:09.929ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54732025-03-07T23:12:09.929ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54742025-03-07T23:12:09.929ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54752025-03-07T23:12:09.929ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54762025-03-07T23:12:09.939ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54772025-03-07T23:12:09.941ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54782025-03-07T23:12:09.941ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54792025-03-07T23:12:09.941ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54802025-03-07T23:12:09.942ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcUpdateFirewall
54812025-03-07T23:12:09.982ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54822025-03-07T23:12:09.983ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("2932c1b7-f405-4b5d-991e-3f758ceb382e"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:09.919238922Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919238922Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c729cadc-2166-4931-8368-c65ca0a4074b"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:09.919260713Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919260713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("0ab5d791-443a-4f03-9157-d27804069af1"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:09.919274054Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919274054Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]) node_id = 13 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54832025-03-07T23:12:09.991ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
54842025-03-07T23:12:09.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
54852025-03-07T23:12:10.005ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54862025-03-07T23:12:10.006ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54872025-03-07T23:12:10.006ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54882025-03-07T23:12:10.006ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54892025-03-07T23:12:10.007ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54902025-03-07T23:12:10.011ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54912025-03-07T23:12:10.011ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54922025-03-07T23:12:10.012ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54932025-03-07T23:12:10.012ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54942025-03-07T23:12:10.015ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54952025-03-07T23:12:10.017ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54962025-03-07T23:12:10.017ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54972025-03-07T23:12:10.017ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54982025-03-07T23:12:10.031ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
54992025-03-07T23:12:10.042ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55002025-03-07T23:12:10.042ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55012025-03-07T23:12:10.042ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55022025-03-07T23:12:10.043ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55032025-03-07T23:12:10.049ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55042025-03-07T23:12:10.049ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55052025-03-07T23:12:10.050ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55062025-03-07T23:12:10.058ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55072025-03-07T23:12:10.058ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55082025-03-07T23:12:10.060ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55092025-03-07T23:12:10.141ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 240dc6d3-4e7b-4c66-8acc-c088f4e5148e, lookup_type: ById(240dc6d3-4e7b-4c66-8acc-c088f4e5148e) } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55102025-03-07T23:12:10.141ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55112025-03-07T23:12:10.141ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55122025-03-07T23:12:10.141ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55132025-03-07T23:12:10.142ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55142025-03-07T23:12:10.144ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55152025-03-07T23:12:10.145ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55162025-03-07T23:12:10.145ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55172025-03-07T23:12:10.145ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55182025-03-07T23:12:10.153ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55192025-03-07T23:12:10.154ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55202025-03-07T23:12:10.154ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55212025-03-07T23:12:10.154ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55222025-03-07T23:12:10.158ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55232025-03-07T23:12:10.165ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 240dc6d3-4e7b-4c66-8acc-c088f4e5148e, lookup_type: ById(240dc6d3-4e7b-4c66-8acc-c088f4e5148e) } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55242025-03-07T23:12:10.167ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55252025-03-07T23:12:10.167ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55262025-03-07T23:12:10.167ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcCreateGateway
55272025-03-07T23:12:10.181ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55282025-03-07T23:12:10.181ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e"), "lookup_type": Object {"ById": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 14 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55292025-03-07T23:12:10.191ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55302025-03-07T23:12:10.191ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55312025-03-07T23:12:10.208ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55322025-03-07T23:12:10.209ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55332025-03-07T23:12:10.219ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55342025-03-07T23:12:10.222ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55352025-03-07T23:12:10.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55362025-03-07T23:12:10.223ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
55372025-03-07T23:12:10.224ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
55382025-03-07T23:12:10.227ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55392025-03-07T23:12:10.227ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55402025-03-07T23:12:10.228ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55412025-03-07T23:12:10.229ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
55422025-03-07T23:12:10.229ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
55432025-03-07T23:12:10.232ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55442025-03-07T23:12:10.232ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55452025-03-07T23:12:10.234ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55462025-03-07T23:12:10.234ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
55472025-03-07T23:12:10.234ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55482025-03-07T23:12:10.236ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55492025-03-07T23:12:10.236ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55502025-03-07T23:12:10.236ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55512025-03-07T23:12:10.236ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55522025-03-07T23:12:10.236ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55532025-03-07T23:12:10.240ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55542025-03-07T23:12:10.240ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55552025-03-07T23:12:10.240ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55562025-03-07T23:12:10.241ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55572025-03-07T23:12:10.251ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55582025-03-07T23:12:10.251ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55592025-03-07T23:12:10.251ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55602025-03-07T23:12:10.251ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55612025-03-07T23:12:10.251ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55622025-03-07T23:12:10.264ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55632025-03-07T23:12:10.266ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55642025-03-07T23:12:10.266ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55652025-03-07T23:12:10.267ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55662025-03-07T23:12:10.267ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55672025-03-07T23:12:10.267ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55682025-03-07T23:12:10.269ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55692025-03-07T23:12:10.272ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55702025-03-07T23:12:10.272ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55712025-03-07T23:12:10.272ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55722025-03-07T23:12:10.273ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55732025-03-07T23:12:10.273ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55742025-03-07T23:12:10.273ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55752025-03-07T23:12:10.275ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55762025-03-07T23:12:10.283ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55772025-03-07T23:12:10.292ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55782025-03-07T23:12:10.292ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55792025-03-07T23:12:10.292ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55802025-03-07T23:12:10.293ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55812025-03-07T23:12:10.308ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
55822025-03-07T23:12:10.309ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = []
55832025-03-07T23:12:10.309ZDEBGtest_unauthorized (nexus): resolved 0 rules for sleds
55842025-03-07T23:12:10.323ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
55852025-03-07T23:12:10.340ZDEBGtest_unauthorized (nexus): resolved sleds for vpc demo-vpc vpc_to_sled = []
55862025-03-07T23:12:10.340ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
55872025-03-07T23:12:10.341ZINFOtest_unauthorized (nexus): updated firewall rules on 0 sleds
55882025-03-07T23:12:10.341ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55892025-03-07T23:12:10.341ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55902025-03-07T23:12:10.341ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_node = VpcNotifySleds
55912025-03-07T23:12:10.349ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55922025-03-07T23:12:10.350ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 15 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55932025-03-07T23:12:10.357ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55942025-03-07T23:12:10.357ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55952025-03-07T23:12:10.363ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55962025-03-07T23:12:10.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55972025-03-07T23:12:10.377ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
55982025-03-07T23:12:10.377ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850
55992025-03-07T23:12:10.401ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
56002025-03-07T23:12:10.402ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = ee6bae74-08c9-4961-8b6c-d0176074b850 saga_name = vpc-create saga_result = SagaResult { saga_id: ee6bae74-08c9-4961-8b6c-d0176074b850, saga_log: SagaLog { saga_id: ee6bae74-08c9-4961-8b6c-d0176074b850, unwinding: false, events: [N016 started, N016 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N017 started, N017 succeeded], node_status: {0: Succeeded(String("fc680bc2-be0e-46b0-b793-b590e88c148c")), 1: Succeeded(String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")), 2: Succeeded(String("b5ca99d3-42f7-4eb8-9b04-1a0768a030a4")), 3: Succeeded(String("c0849238-95c0-420f-8830-6e811e32f9a3")), 4: Succeeded(String("97fe4b96-a082-4885-8fa1-be124bae06e2")), 5: Succeeded(String("06aacce2-dcd7-43d4-8720-485fd6c33cae")), 6: Succeeded(String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e")), 7: Succeeded(Array [Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:12:09.472846Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.472846Z")}, "ipv6_prefix": String("fd0d:5baa:64a9::/48"), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "subnet_gen": Number(1), "system_router_id": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "vni": Number(7936547)}]), 8: Succeeded(Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Array [Object {"key": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "name": String("default"), "time_created": String("2025-03-07T23:12:09.714375Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.714375Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0d:5baa:64a9::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]), 12: Succeeded(Object {"key": String("97fe4b96-a082-4885-8fa1-be124bae06e2"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 13: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("2932c1b7-f405-4b5d-991e-3f758ceb382e"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:09.919238922Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919238922Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c729cadc-2166-4931-8368-c65ca0a4074b"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:09.919260713Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919260713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("0ab5d791-443a-4f03-9157-d27804069af1"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:09.919274054Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919274054Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]), 14: Succeeded(Object {"key": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e"), "lookup_type": Object {"ById": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 15: Succeeded(Null), 16: Succeeded(Null), 17: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e"), "default_subnet_id": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "default_v4_route_id": String("b5ca99d3-42f7-4eb8-9b04-1a0768a030a4"), "default_v6_route_id": String("c0849238-95c0-420f-8830-6e811e32f9a3"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("2932c1b7-f405-4b5d-991e-3f758ceb382e"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:12:09.919238922Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919238922Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("c729cadc-2166-4931-8368-c65ca0a4074b"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:12:09.919260713Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919260713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("0ab5d791-443a-4f03-9157-d27804069af1"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:12:09.919274054Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.919274054Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}], "gateway": Object {"key": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e"), "lookup_type": Object {"ById": String("240dc6d3-4e7b-4c66-8acc-c088f4e5148e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "route": Object {"key": String("97fe4b96-a082-4885-8fa1-be124bae06e2"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "lookup_type": Object {"ById": String("06aacce2-dcd7-43d4-8720-485fd6c33cae")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("06aacce2-dcd7-43d4-8720-485fd6c33cae"), "name": String("default"), "time_created": String("2025-03-07T23:12:09.714375Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.714375Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0d:5baa:64a9::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}], "subnet_route_id": String("97fe4b96-a082-4885-8fa1-be124bae06e2"), "system_router_id": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "vpc": Array [Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:12:09.472846Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:09.472846Z")}, "ipv6_prefix": String("fd0d:5baa:64a9::/48"), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "subnet_gen": Number(1), "system_router_id": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "vni": Number(7936547)}], "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")} }) }
56012025-03-07T23:12:10.402ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1162282 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3fda9e2-7041-45a3-a44d-c23955b9a92e response_code = 201 uri = /v1/vpcs?project=demo-project
56022025-03-07T23:12:10.402ZINFOtest_unauthorized (external client test context): client received response status = 201
56032025-03-07T23:12:10.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56042025-03-07T23:12:10.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56052025-03-07T23:12:10.403ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56062025-03-07T23:12:10.403ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56072025-03-07T23:12:10.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56082025-03-07T23:12:10.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56092025-03-07T23:12:10.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56102025-03-07T23:12:10.409ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56112025-03-07T23:12:10.411ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56122025-03-07T23:12:10.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56132025-03-07T23:12:10.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
56142025-03-07T23:12:10.421ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
56152025-03-07T23:12:10.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56162025-03-07T23:12:10.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56172025-03-07T23:12:10.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56182025-03-07T23:12:10.424ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
56192025-03-07T23:12:10.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56202025-03-07T23:12:10.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56212025-03-07T23:12:10.425ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56222025-03-07T23:12:10.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
56232025-03-07T23:12:10.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
56242025-03-07T23:12:10.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56252025-03-07T23:12:10.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56262025-03-07T23:12:10.431ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56272025-03-07T23:12:10.435ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
56282025-03-07T23:12:10.435ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
56292025-03-07T23:12:10.435ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56302025-03-07T23:12:10.435ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56312025-03-07T23:12:10.435ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56322025-03-07T23:12:10.437ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
56332025-03-07T23:12:10.437ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56342025-03-07T23:12:10.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56352025-03-07T23:12:10.438ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56362025-03-07T23:12:10.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
56372025-03-07T23:12:10.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
56382025-03-07T23:12:10.443ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56392025-03-07T23:12:10.443ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56402025-03-07T23:12:10.443ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56412025-03-07T23:12:10.450ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56422025-03-07T23:12:10.450ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56432025-03-07T23:12:10.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56442025-03-07T23:12:10.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56452025-03-07T23:12:10.451ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56462025-03-07T23:12:10.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56472025-03-07T23:12:10.455ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56482025-03-07T23:12:10.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56492025-03-07T23:12:10.462ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56502025-03-07T23:12:10.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56512025-03-07T23:12:10.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56522025-03-07T23:12:10.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56532025-03-07T23:12:10.476ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56542025-03-07T23:12:10.476ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56552025-03-07T23:12:10.478ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56562025-03-07T23:12:10.479ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56572025-03-07T23:12:10.487ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56582025-03-07T23:12:10.489ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56592025-03-07T23:12:10.489ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56602025-03-07T23:12:10.489ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56612025-03-07T23:12:10.495ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56622025-03-07T23:12:10.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56632025-03-07T23:12:10.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56642025-03-07T23:12:10.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56652025-03-07T23:12:10.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56662025-03-07T23:12:10.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56672025-03-07T23:12:10.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56682025-03-07T23:12:10.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56692025-03-07T23:12:10.524ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56702025-03-07T23:12:10.525ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56712025-03-07T23:12:10.525ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56722025-03-07T23:12:10.527ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56732025-03-07T23:12:10.531ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56742025-03-07T23:12:10.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56752025-03-07T23:12:10.533ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ById(fc680bc2-be0e-46b0-b793-b590e88c148c) }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56762025-03-07T23:12:10.535ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56772025-03-07T23:12:10.536ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56782025-03-07T23:12:10.536ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56792025-03-07T23:12:10.536ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56802025-03-07T23:12:10.545ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56812025-03-07T23:12:10.548ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56822025-03-07T23:12:10.548ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56832025-03-07T23:12:10.548ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56842025-03-07T23:12:10.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56852025-03-07T23:12:10.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56862025-03-07T23:12:10.550ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56872025-03-07T23:12:10.551ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56882025-03-07T23:12:10.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56892025-03-07T23:12:10.565ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ById(fc680bc2-be0e-46b0-b793-b590e88c148c) }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56902025-03-07T23:12:10.566ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create
56912025-03-07T23:12:10.571ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":7,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[6,0,null],[5,7,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcSubnetId","name":"subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateRouteId","name":"route_id"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_subnet","label":"VpcSubnetCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_sys_route","label":"VpcSubnetCreateSysRoute","name":"route"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_link_custom","label":"VpcSubnetCreateLinkCustom","name":"output"}},{"Action":{"action_name":"vpc_subnet_create.vpc_notify_rpw","label":"VpcNotifyRpw","name":"notified"}},{"Start":{"params":{"authz_system_router":{"key":"4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4","lookup_type":{"ById":"4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"},"parent":{"key":"fc680bc2-be0e-46b0-b793-b590e88c148c","lookup_type":{"ById":"fc680bc2-be0e-46b0-b793-b590e88c148c"},"parent":{"key":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","lookup_type":{"ById":"12ae9422-28d6-4476-8e2f-3bf8240cdde8"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}}}},"authz_vpc":{"key":"fc680bc2-be0e-46b0-b793-b590e88c148c","lookup_type":{"ByName":"demo-vpc"},"parent":{"key":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","lookup_type":{"ByName":"demo-project"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}}},"custom_router":null,"potential_ipv6_blocks":["fd0d:5baa:64a9:9ff0::/64","fd0d:5baa:64a9:658c::/64","fd0d:5baa:64a9:de9::/64"],"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"subnet_create":{"custom_router":null,"description":"","ipv4_block":"10.1.2.3/8","ipv6_block":null,"name":"demo-vpc-subnet"}}}},"End"]},"saga_name":"vpc-subnet-create","start_node":6} saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
56922025-03-07T23:12:10.571ZINFOtest_unauthorized (SecStore): creating saga saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create
56932025-03-07T23:12:10.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56942025-03-07T23:12:10.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56952025-03-07T23:12:10.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56962025-03-07T23:12:10.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56972025-03-07T23:12:10.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56982025-03-07T23:12:10.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56992025-03-07T23:12:10.660ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create
57002025-03-07T23:12:10.661ZINFOtest_unauthorized (SEC): saga start saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57012025-03-07T23:12:10.661ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57022025-03-07T23:12:10.661ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57032025-03-07T23:12:10.666ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57042025-03-07T23:12:10.667ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57052025-03-07T23:12:10.679ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57062025-03-07T23:12:10.679ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57072025-03-07T23:12:10.687ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57082025-03-07T23:12:10.688ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("1b82fd14-ed15-44a3-a968-8fc070a8312e")) node_id = 0 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57092025-03-07T23:12:10.693ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57102025-03-07T23:12:10.695ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57112025-03-07T23:12:10.699ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57122025-03-07T23:12:10.703ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("244db68b-77f7-475a-a328-151652eafa9e")) node_id = 1 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57132025-03-07T23:12:10.707ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57142025-03-07T23:12:10.708ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57152025-03-07T23:12:10.713ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57162025-03-07T23:12:10.715ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57172025-03-07T23:12:10.715ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57182025-03-07T23:12:10.715ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57192025-03-07T23:12:10.715ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57202025-03-07T23:12:10.717ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57212025-03-07T23:12:10.722ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57222025-03-07T23:12:10.722ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57232025-03-07T23:12:10.723ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57242025-03-07T23:12:10.723ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57252025-03-07T23:12:10.723ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57262025-03-07T23:12:10.723ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57272025-03-07T23:12:10.723ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57282025-03-07T23:12:10.723ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57292025-03-07T23:12:10.729ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57302025-03-07T23:12:10.746ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57312025-03-07T23:12:10.746ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]) node_id = 2 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57322025-03-07T23:12:10.758ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57332025-03-07T23:12:10.758ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57342025-03-07T23:12:10.768ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ById(fc680bc2-be0e-46b0-b793-b590e88c148c) }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57352025-03-07T23:12:10.768ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57362025-03-07T23:12:10.768ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57372025-03-07T23:12:10.768ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57382025-03-07T23:12:10.769ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57392025-03-07T23:12:10.773ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57402025-03-07T23:12:10.773ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57412025-03-07T23:12:10.773ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57422025-03-07T23:12:10.774ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57432025-03-07T23:12:10.783ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57442025-03-07T23:12:10.783ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57452025-03-07T23:12:10.783ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57462025-03-07T23:12:10.783ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57472025-03-07T23:12:10.790ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57482025-03-07T23:12:10.798ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ById(fc680bc2-be0e-46b0-b793-b590e88c148c) }, key: 4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4, lookup_type: ById(4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4) } result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57492025-03-07T23:12:10.799ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57502025-03-07T23:12:10.799ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57512025-03-07T23:12:10.799ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57522025-03-07T23:12:10.816ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57532025-03-07T23:12:10.816ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("244db68b-77f7-475a-a328-151652eafa9e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ById": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ById": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 3 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57542025-03-07T23:12:10.827ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57552025-03-07T23:12:10.827ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57562025-03-07T23:12:10.837ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57572025-03-07T23:12:10.837ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}) node_id = 4 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57582025-03-07T23:12:10.845ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57592025-03-07T23:12:10.845ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57602025-03-07T23:12:10.851ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57612025-03-07T23:12:10.852ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57622025-03-07T23:12:10.852ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57632025-03-07T23:12:10.857ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57642025-03-07T23:12:10.858ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57652025-03-07T23:12:10.869ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57662025-03-07T23:12:10.869ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57672025-03-07T23:12:10.875ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57682025-03-07T23:12:10.876ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57692025-03-07T23:12:10.883ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57702025-03-07T23:12:10.883ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7
57712025-03-07T23:12:10.900ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
57722025-03-07T23:12:10.904ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 49a530a7-3642-413b-a9fd-a2cb409d0ad7 saga_name = vpc-subnet-create saga_result = SagaResult { saga_id: 49a530a7-3642-413b-a9fd-a2cb409d0ad7, saga_log: SagaLog { saga_id: 49a530a7-3642-413b-a9fd-a2cb409d0ad7, unwinding: false, events: [N006 started, N006 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N007 started, N007 succeeded], node_status: {0: Succeeded(String("1b82fd14-ed15-44a3-a968-8fc070a8312e")), 1: Succeeded(String("244db68b-77f7-475a-a328-151652eafa9e")), 2: Succeeded(Array [Object {"key": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}]), 3: Succeeded(Object {"key": String("244db68b-77f7-475a-a328-151652eafa9e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ById": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ById": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 4: Succeeded(Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"notified": Null, "output": Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, "route": Object {"key": String("244db68b-77f7-475a-a328-151652eafa9e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4"), "lookup_type": Object {"ById": String("4e6b9cc0-e4db-498a-a5ef-f1705a39fbe4")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ById": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ById": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route_id": String("244db68b-77f7-475a-a328-151652eafa9e"), "subnet": Array [Object {"key": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "lookup_type": Object {"ById": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")}, "parent": Object {"key": String("fc680bc2-be0e-46b0-b793-b590e88c148c"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:12:10.713469Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:10.713469Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd0d:5baa:64a9:9ff0::/64"), "rcgen": Number(1), "vpc_id": String("fc680bc2-be0e-46b0-b793-b590e88c148c")}], "subnet_id": String("1b82fd14-ed15-44a3-a968-8fc070a8312e")} }) }
57732025-03-07T23:12:10.904ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 2 reason = Signaled
57742025-03-07T23:12:10.904ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
57752025-03-07T23:12:10.904ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
57762025-03-07T23:12:10.904ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
57772025-03-07T23:12:10.904ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
57782025-03-07T23:12:10.904ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
57792025-03-07T23:12:10.904ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
57802025-03-07T23:12:10.904ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 498998 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5be8e38c-2c46-48ef-8e8a-e4cef2dfcac2 response_code = 201 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57812025-03-07T23:12:10.904ZINFOtest_unauthorized (external client test context): client received response status = 201
57822025-03-07T23:12:10.905ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
57832025-03-07T23:12:10.905ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
57842025-03-07T23:12:10.905ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
57852025-03-07T23:12:10.905ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
57862025-03-07T23:12:10.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
57872025-03-07T23:12:10.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
57882025-03-07T23:12:10.905ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
57892025-03-07T23:12:10.911ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
57902025-03-07T23:12:10.916ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
57912025-03-07T23:12:10.917ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
57922025-03-07T23:12:10.918ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
57932025-03-07T23:12:10.918ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
57942025-03-07T23:12:10.918ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
57952025-03-07T23:12:10.919ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
57962025-03-07T23:12:10.921ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
57972025-03-07T23:12:10.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
57982025-03-07T23:12:10.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
57992025-03-07T23:12:10.922ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
58002025-03-07T23:12:10.926ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
58012025-03-07T23:12:10.927ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
58022025-03-07T23:12:10.927ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
58032025-03-07T23:12:10.927ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
58042025-03-07T23:12:10.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
58052025-03-07T23:12:10.941ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58062025-03-07T23:12:10.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58072025-03-07T23:12:10.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58082025-03-07T23:12:10.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58092025-03-07T23:12:10.948ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58102025-03-07T23:12:10.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58112025-03-07T23:12:10.949ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58122025-03-07T23:12:10.949ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58132025-03-07T23:12:10.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
58142025-03-07T23:12:10.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
58152025-03-07T23:12:10.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58162025-03-07T23:12:10.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58172025-03-07T23:12:10.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58182025-03-07T23:12:10.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
58192025-03-07T23:12:10.957ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58202025-03-07T23:12:10.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58212025-03-07T23:12:10.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58222025-03-07T23:12:10.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58232025-03-07T23:12:10.970ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58242025-03-07T23:12:10.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58252025-03-07T23:12:10.970ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58262025-03-07T23:12:10.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58272025-03-07T23:12:10.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
58282025-03-07T23:12:10.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
58292025-03-07T23:12:10.982ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58302025-03-07T23:12:10.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58312025-03-07T23:12:10.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58322025-03-07T23:12:10.983ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58332025-03-07T23:12:10.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58342025-03-07T23:12:10.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58352025-03-07T23:12:10.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58362025-03-07T23:12:10.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58372025-03-07T23:12:10.997ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58382025-03-07T23:12:10.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58392025-03-07T23:12:11.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58402025-03-07T23:12:11.006ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58412025-03-07T23:12:11.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58422025-03-07T23:12:11.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58432025-03-07T23:12:11.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58442025-03-07T23:12:11.011ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58452025-03-07T23:12:11.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58462025-03-07T23:12:11.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58472025-03-07T23:12:11.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58482025-03-07T23:12:11.037ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58492025-03-07T23:12:11.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58502025-03-07T23:12:11.037ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58512025-03-07T23:12:11.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58522025-03-07T23:12:11.041ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58532025-03-07T23:12:11.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58542025-03-07T23:12:11.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58552025-03-07T23:12:11.048ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58562025-03-07T23:12:11.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58572025-03-07T23:12:11.048ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58582025-03-07T23:12:11.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58592025-03-07T23:12:11.052ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58602025-03-07T23:12:11.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58612025-03-07T23:12:11.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58622025-03-07T23:12:11.053ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58632025-03-07T23:12:11.056ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58642025-03-07T23:12:11.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58652025-03-07T23:12:11.056ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58662025-03-07T23:12:11.058ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58672025-03-07T23:12:11.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58682025-03-07T23:12:11.069ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58692025-03-07T23:12:11.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58702025-03-07T23:12:11.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58712025-03-07T23:12:11.070ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58722025-03-07T23:12:11.122ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
58732025-03-07T23:12:11.123ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
58742025-03-07T23:12:11.123ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 219982 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1a02035e-735e-48a9-96cd-a890d72a19c9 response_code = 201 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58752025-03-07T23:12:11.124ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34804 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
58762025-03-07T23:12:11.124ZINFOtest_unauthorized (external client test context): client received response status = 201
58772025-03-07T23:12:11.124ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
58782025-03-07T23:12:11.128ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34804 req_id = 531d7359-02e8-4580-83f3-90b96d5d1485 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
58792025-03-07T23:12:11.130ZINFOtest_unauthorized (dropshot): request completed latency_us = 256 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34804 req_id = 531d7359-02e8-4580-83f3-90b96d5d1485 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
58802025-03-07T23:12:11.130ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
58812025-03-07T23:12:11.130ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
58822025-03-07T23:12:11.130ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
58832025-03-07T23:12:11.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58842025-03-07T23:12:11.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58852025-03-07T23:12:11.130ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58862025-03-07T23:12:11.130ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "531d7359-02e8-4580-83f3-90b96d5d1485", "content-length": "2", "date": "Fri, 07 Mar 2025 23:12:10 GMT"} })
58872025-03-07T23:12:11.130ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
58882025-03-07T23:12:11.130ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
58892025-03-07T23:12:11.130ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
58902025-03-07T23:12:11.136ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58912025-03-07T23:12:11.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58922025-03-07T23:12:11.140ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58932025-03-07T23:12:11.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
58942025-03-07T23:12:11.145ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58952025-03-07T23:12:11.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58962025-03-07T23:12:11.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58972025-03-07T23:12:11.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58982025-03-07T23:12:11.148ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58992025-03-07T23:12:11.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59002025-03-07T23:12:11.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59012025-03-07T23:12:11.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59022025-03-07T23:12:11.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
59032025-03-07T23:12:11.153ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
59042025-03-07T23:12:11.153ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59052025-03-07T23:12:11.154ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59062025-03-07T23:12:11.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59072025-03-07T23:12:11.157ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
59082025-03-07T23:12:11.157ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
59092025-03-07T23:12:11.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
59102025-03-07T23:12:11.157ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
59112025-03-07T23:12:11.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59122025-03-07T23:12:11.157ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59132025-03-07T23:12:11.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59142025-03-07T23:12:11.161ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34804 req_id = 8cd8c0a3-0c23-4f3e-8da7-5d4729a08836 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
59152025-03-07T23:12:11.161ZINFOtest_unauthorized (dropshot): request completed latency_us = 339 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34804 req_id = 8cd8c0a3-0c23-4f3e-8da7-5d4729a08836 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
59162025-03-07T23:12:11.161ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "8cd8c0a3-0c23-4f3e-8da7-5d4729a08836", "date": "Fri, 07 Mar 2025 23:12:10 GMT"} })
59172025-03-07T23:12:11.161ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 260.693456ms iteration = 2 status = {}
59182025-03-07T23:12:11.161ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
59192025-03-07T23:12:11.163ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59202025-03-07T23:12:11.163ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59212025-03-07T23:12:11.170ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59222025-03-07T23:12:11.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
59232025-03-07T23:12:11.172ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
59242025-03-07T23:12:11.172ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59252025-03-07T23:12:11.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59262025-03-07T23:12:11.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59272025-03-07T23:12:11.172ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59282025-03-07T23:12:11.173ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59292025-03-07T23:12:11.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59302025-03-07T23:12:11.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59312025-03-07T23:12:11.177ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59322025-03-07T23:12:11.178ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59332025-03-07T23:12:11.178ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59342025-03-07T23:12:11.179ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59352025-03-07T23:12:11.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59362025-03-07T23:12:11.180ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59372025-03-07T23:12:11.182ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59382025-03-07T23:12:11.182ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59392025-03-07T23:12:11.182ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59402025-03-07T23:12:11.182ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59412025-03-07T23:12:11.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59422025-03-07T23:12:11.186ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59432025-03-07T23:12:11.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59442025-03-07T23:12:11.186ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59452025-03-07T23:12:11.186ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59462025-03-07T23:12:11.191ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59472025-03-07T23:12:11.191ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59482025-03-07T23:12:11.191ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59492025-03-07T23:12:11.192ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59502025-03-07T23:12:11.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59512025-03-07T23:12:11.202ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59522025-03-07T23:12:11.202ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59532025-03-07T23:12:11.203ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59542025-03-07T23:12:11.203ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59552025-03-07T23:12:11.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59562025-03-07T23:12:11.204ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59572025-03-07T23:12:11.206ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59582025-03-07T23:12:11.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59592025-03-07T23:12:11.206ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59602025-03-07T23:12:11.206ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59612025-03-07T23:12:11.209ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59622025-03-07T23:12:11.210ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59632025-03-07T23:12:11.210ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59642025-03-07T23:12:11.210ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59652025-03-07T23:12:11.213ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59662025-03-07T23:12:11.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59672025-03-07T23:12:11.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59682025-03-07T23:12:11.221ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59692025-03-07T23:12:11.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59702025-03-07T23:12:11.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59712025-03-07T23:12:11.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59722025-03-07T23:12:11.224ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
59732025-03-07T23:12:11.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
59742025-03-07T23:12:11.228ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
59752025-03-07T23:12:11.228ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
59762025-03-07T23:12:11.232ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
59772025-03-07T23:12:11.232ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59782025-03-07T23:12:11.239ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59792025-03-07T23:12:11.239ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59802025-03-07T23:12:11.240ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59812025-03-07T23:12:11.259ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 3 reason = Signaled
59822025-03-07T23:12:11.259ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
59832025-03-07T23:12:11.259ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
59842025-03-07T23:12:11.259ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
59852025-03-07T23:12:11.259ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
59862025-03-07T23:12:11.260ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
59872025-03-07T23:12:11.260ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
59882025-03-07T23:12:11.261ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 135537 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2146e19-ecdd-42cb-9c69-ba63ee0e63fc response_code = 201 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59892025-03-07T23:12:11.262ZINFOtest_unauthorized (external client test context): client received response status = 201
59902025-03-07T23:12:11.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
59912025-03-07T23:12:11.262ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab uri = /v1/disks?project=demo-project
59922025-03-07T23:12:11.263ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab uri = /v1/disks?project=demo-project
59932025-03-07T23:12:11.264ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
59942025-03-07T23:12:11.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59952025-03-07T23:12:11.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59962025-03-07T23:12:11.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59972025-03-07T23:12:11.264ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
59982025-03-07T23:12:11.267ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
59992025-03-07T23:12:11.267ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
60002025-03-07T23:12:11.267ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60012025-03-07T23:12:11.267ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60022025-03-07T23:12:11.267ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60032025-03-07T23:12:11.267ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60042025-03-07T23:12:11.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60052025-03-07T23:12:11.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60062025-03-07T23:12:11.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60072025-03-07T23:12:11.270ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
60082025-03-07T23:12:11.272ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
60092025-03-07T23:12:11.272ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60102025-03-07T23:12:11.272ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60112025-03-07T23:12:11.273ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60122025-03-07T23:12:11.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
60132025-03-07T23:12:11.276ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
60142025-03-07T23:12:11.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60152025-03-07T23:12:11.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60162025-03-07T23:12:11.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60172025-03-07T23:12:11.309ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
60182025-03-07T23:12:11.309ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
60192025-03-07T23:12:11.310ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34806 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
60202025-03-07T23:12:11.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60212025-03-07T23:12:11.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60222025-03-07T23:12:11.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60232025-03-07T23:12:11.318ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60242025-03-07T23:12:11.318ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34806 req_id = 1393df45-337b-4a60-845c-f67e22eb99a5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
60252025-03-07T23:12:11.318ZINFOtest_unauthorized (dropshot): request completed latency_us = 206 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34806 req_id = 1393df45-337b-4a60-845c-f67e22eb99a5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
60262025-03-07T23:12:11.318ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "1393df45-337b-4a60-845c-f67e22eb99a5", "content-length": "2", "date": "Fri, 07 Mar 2025 23:12:10 GMT"} })
60272025-03-07T23:12:11.318ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60282025-03-07T23:12:11.318ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60292025-03-07T23:12:11.318ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60302025-03-07T23:12:11.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
60312025-03-07T23:12:11.318ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
60322025-03-07T23:12:11.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60332025-03-07T23:12:11.320ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60342025-03-07T23:12:11.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60352025-03-07T23:12:11.321ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
60362025-03-07T23:12:11.321ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
60372025-03-07T23:12:11.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60382025-03-07T23:12:11.323ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60392025-03-07T23:12:11.323ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60402025-03-07T23:12:11.323ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
60412025-03-07T23:12:11.327ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60422025-03-07T23:12:11.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60432025-03-07T23:12:11.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60442025-03-07T23:12:11.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60452025-03-07T23:12:11.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
60462025-03-07T23:12:11.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
60472025-03-07T23:12:11.334ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab uri = /v1/disks?project=demo-project
60482025-03-07T23:12:11.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database uri = /v1/disks?project=demo-project
60492025-03-07T23:12:11.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60502025-03-07T23:12:11.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60512025-03-07T23:12:11.335ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database uri = /v1/disks?project=demo-project
60522025-03-07T23:12:11.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60532025-03-07T23:12:11.336ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60542025-03-07T23:12:11.338ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
60552025-03-07T23:12:11.338ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
60562025-03-07T23:12:11.339ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34806 req_id = 943c02ab-ca3e-4bc7-8174-2ffac21255fd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
60572025-03-07T23:12:11.339ZINFOtest_unauthorized (dropshot): request completed latency_us = 285 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34806 req_id = 943c02ab-ca3e-4bc7-8174-2ffac21255fd response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
60582025-03-07T23:12:11.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
60592025-03-07T23:12:11.341ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
60602025-03-07T23:12:11.341ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database uri = /v1/disks?project=demo-project
60612025-03-07T23:12:11.341ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60622025-03-07T23:12:11.341ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60632025-03-07T23:12:11.341ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "943c02ab-ca3e-4bc7-8174-2ffac21255fd", "date": "Fri, 07 Mar 2025 23:12:10 GMT"} })
60642025-03-07T23:12:11.341ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 82.032702ms iteration = 3 status = {}
60652025-03-07T23:12:11.343ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
60662025-03-07T23:12:11.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database uri = /v1/disks?project=demo-project
60672025-03-07T23:12:11.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60682025-03-07T23:12:11.344ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60692025-03-07T23:12:11.346ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
60702025-03-07T23:12:11.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database uri = /v1/disks?project=demo-project
60712025-03-07T23:12:11.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60722025-03-07T23:12:11.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60732025-03-07T23:12:11.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
60742025-03-07T23:12:11.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
60752025-03-07T23:12:11.355ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create
60762025-03-07T23:12:11.355ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":10,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[9,0,null],[8,10,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateDiskId","name":"disk_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"disk_create.create_disk_record","label":"CreateDiskRecord","name":"created_disk"}},{"Action":{"action_name":"disk_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"disk_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"disk_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"disk_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"disk_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"disk_create.finalize_disk_record","label":"FinalizeDiskRecord","name":"disk_runtime"}},{"Start":{"params":{"create_params":{"description":"","disk_source":{"block_size":4096,"type":"blank"},"name":"demo-disk","size":2147483648},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"disk-create","start_node":9} saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60772025-03-07T23:12:11.356ZINFOtest_unauthorized (SecStore): creating saga saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create
60782025-03-07T23:12:11.363ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create
60792025-03-07T23:12:11.363ZINFOtest_unauthorized (SEC): saga start saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60802025-03-07T23:12:11.363ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60812025-03-07T23:12:11.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60822025-03-07T23:12:11.370ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60832025-03-07T23:12:11.370ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60842025-03-07T23:12:11.379ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60852025-03-07T23:12:11.380ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60862025-03-07T23:12:11.383ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60872025-03-07T23:12:11.383ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("0c4001f0-f776-4e82-98bc-918ec9d357f4")) node_id = 0 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60882025-03-07T23:12:11.389ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60892025-03-07T23:12:11.390ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60902025-03-07T23:12:11.393ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60912025-03-07T23:12:11.393ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("9d5cd6fd-6069-4e10-a917-c714b823db74")) node_id = 1 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60922025-03-07T23:12:11.398ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
60932025-03-07T23:12:11.398ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
60942025-03-07T23:12:11.402ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
60952025-03-07T23:12:11.403ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
60962025-03-07T23:12:11.403ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
60972025-03-07T23:12:11.405ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
60982025-03-07T23:12:11.407ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
60992025-03-07T23:12:11.407ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61002025-03-07T23:12:11.407ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61012025-03-07T23:12:11.407ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61022025-03-07T23:12:11.407ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61032025-03-07T23:12:11.407ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61042025-03-07T23:12:11.407ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61052025-03-07T23:12:11.409ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61062025-03-07T23:12:11.410ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61072025-03-07T23:12:11.411ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61082025-03-07T23:12:11.411ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61092025-03-07T23:12:11.412ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61102025-03-07T23:12:11.414ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61112025-03-07T23:12:11.414ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61122025-03-07T23:12:11.414ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61132025-03-07T23:12:11.414ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61142025-03-07T23:12:11.418ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61152025-03-07T23:12:11.418ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61162025-03-07T23:12:11.419ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61172025-03-07T23:12:11.419ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61182025-03-07T23:12:11.420ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61192025-03-07T23:12:11.420ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61202025-03-07T23:12:11.423ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61212025-03-07T23:12:11.423ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61222025-03-07T23:12:11.423ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61232025-03-07T23:12:11.424ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61242025-03-07T23:12:11.426ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61252025-03-07T23:12:11.426ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61262025-03-07T23:12:11.426ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61272025-03-07T23:12:11.427ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61282025-03-07T23:12:11.429ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61292025-03-07T23:12:11.434ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61302025-03-07T23:12:11.434ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61312025-03-07T23:12:11.434ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61322025-03-07T23:12:11.435ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = CreateDiskRecord
61332025-03-07T23:12:11.524ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61342025-03-07T23:12:11.524ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:12:11.402651Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:11.402651Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:11.402650Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}) node_id = 2 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61352025-03-07T23:12:11.538ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61362025-03-07T23:12:11.538ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61372025-03-07T23:12:11.550ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = RegionsAlloc
61382025-03-07T23:12:11.551ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = RegionsAlloc
61392025-03-07T23:12:11.551ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = RegionsAlloc
61402025-03-07T23:12:11.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
61412025-03-07T23:12:11.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61422025-03-07T23:12:11.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ef7df944-41a8-4066-8270-0f1298a4f1d5 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61432025-03-07T23:12:11.579ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ef7df944-41a8-4066-8270-0f1298a4f1d5 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61442025-03-07T23:12:11.579ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ef7df944-41a8-4066-8270-0f1298a4f1d5 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61452025-03-07T23:12:11.579ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ef7df944-41a8-4066-8270-0f1298a4f1d5 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61462025-03-07T23:12:11.581ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8113 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ef7df944-41a8-4066-8270-0f1298a4f1d5 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61472025-03-07T23:12:11.582ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "ef7df944-41a8-4066-8270-0f1298a4f1d5", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:11 GMT"} })
61482025-03-07T23:12:11.582ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61492025-03-07T23:12:11.583ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 05851f56-675b-49a3-94d9-9744dabceac0 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61502025-03-07T23:12:11.584ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 05851f56-675b-49a3-94d9-9744dabceac0 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61512025-03-07T23:12:11.584ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 05851f56-675b-49a3-94d9-9744dabceac0 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61522025-03-07T23:12:11.584ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 05851f56-675b-49a3-94d9-9744dabceac0 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61532025-03-07T23:12:11.589ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61542025-03-07T23:12:11.592ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61552025-03-07T23:12:11.592ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61562025-03-07T23:12:11.592ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61572025-03-07T23:12:11.592ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61582025-03-07T23:12:11.592ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61592025-03-07T23:12:11.597ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14150 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 05851f56-675b-49a3-94d9-9744dabceac0 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
61602025-03-07T23:12:11.597ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 43459067-35ee-4799-a90e-62fe47e85e2d (dataset), time_created: 2025-03-07T23:12:01.989347Z, time_modified: 2025-03-07T23:12:01.989347Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 15974051-fd8d-4f83-9273-5c6e7019b38e, ip: ::1, port: SqlU16(39323), size_used: 2147483648 }, Region { identity: RegionIdentity { id: babce11f-67c0-4261-ba5b-b14299523d56, time_created: 2025-03-07T23:12:11.568158Z, time_modified: 2025-03-07T23:12:11.568158Z }, dataset_id: 43459067-35ee-4799-a90e-62fe47e85e2d (dataset), volume_id: 9d5cd6fd-6069-4e10-a917-c714b823db74 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset), time_created: 2025-03-07T23:12:06.091041Z, time_modified: 2025-03-07T23:12:06.091041Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 59f70ac9-e265-4936-a82b-954ffc6689eb, ip: ::1, port: SqlU16(40767), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 8616586f-ac3f-42eb-9093-dcb9c7174450, time_created: 2025-03-07T23:12:11.568158Z, time_modified: 2025-03-07T23:12:11.568158Z }, dataset_id: dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset), volume_id: 9d5cd6fd-6069-4e10-a917-c714b823db74 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), time_created: 2025-03-07T23:12:05.365939Z, time_modified: 2025-03-07T23:12:05.365939Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 25887b79-b28b-4171-99a8-6100028a7952, ip: ::1, port: SqlU16(37937), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 3a28c948-fca0-41b0-907e-b586cafc1227, time_created: 2025-03-07T23:12:11.568158Z, time_modified: 2025-03-07T23:12:11.568158Z }, dataset_id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), volume_id: 9d5cd6fd-6069-4e10-a917-c714b823db74 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 9d5cd6fd-6069-4e10-a917-c714b823db74
61612025-03-07T23:12:11.597ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61622025-03-07T23:12:11.597ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("babce11f-67c0-4261-ba5b-b14299523d56"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("8616586f-ac3f-42eb-9093-dcb9c7174450"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3a28c948-fca0-41b0-907e-b586cafc1227"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}]]) node_id = 3 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61632025-03-07T23:12:11.598ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "05851f56-675b-49a3-94d9-9744dabceac0", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:11 GMT"} })
61642025-03-07T23:12:11.598ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61652025-03-07T23:12:11.598ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61662025-03-07T23:12:11.598ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
61672025-03-07T23:12:11.609ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61682025-03-07T23:12:11.610ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61692025-03-07T23:12:11.630ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = SpaceAccount
61702025-03-07T23:12:11.630ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = SpaceAccount
61712025-03-07T23:12:11.632ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = SpaceAccount
61722025-03-07T23:12:11.682ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61732025-03-07T23:12:11.682ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61742025-03-07T23:12:11.691ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61752025-03-07T23:12:11.692ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61762025-03-07T23:12:11.702ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61772025-03-07T23:12:11.702ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61782025-03-07T23:12:11.708ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61792025-03-07T23:12:11.711ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61802025-03-07T23:12:11.725ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:39323 remote_addr = [::1]:51812 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
61812025-03-07T23:12:11.726ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = 4ca714e8-2e19-441d-8141-c1d6a214c165 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61822025-03-07T23:12:11.727ZINFOtest_unauthorized (SledAgent): created region babce11f-67c0-4261-ba5b-b14299523d56 end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
61832025-03-07T23:12:11.727ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 360 local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = 4ca714e8-2e19-441d-8141-c1d6a214c165 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61842025-03-07T23:12:11.727ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:37937 remote_addr = [::1]:52910 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
61852025-03-07T23:12:11.729ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:40767 remote_addr = [::1]:34584 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
61862025-03-07T23:12:11.729ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 1ec26a3e-bbb2-4331-b9ef-435588d58c14 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61872025-03-07T23:12:11.729ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = 5cd119b9-f663-490c-881b-177e360c2c3a server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61882025-03-07T23:12:11.729ZINFOtest_unauthorized (SledAgent): created region 3a28c948-fca0-41b0-907e-b586cafc1227 end_port = 1150 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1100
61892025-03-07T23:12:11.729ZINFOtest_unauthorized (SledAgent): created region 8616586f-ac3f-42eb-9093-dcb9c7174450 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
61902025-03-07T23:12:11.729ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 398 local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 1ec26a3e-bbb2-4331-b9ef-435588d58c14 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61912025-03-07T23:12:11.729ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 353 local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = 5cd119b9-f663-490c-881b-177e360c2c3a response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
61922025-03-07T23:12:11.778ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61932025-03-07T23:12:11.778ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "key": String("DhZKipAjez5HFrN0ZUGH5KJlCxVxcyH4wZcUiSVb/4U="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1000"), String("[::1]:1100"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}) node_id = 6 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61942025-03-07T23:12:11.798ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61952025-03-07T23:12:11.803ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61962025-03-07T23:12:11.839ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61972025-03-07T23:12:11.839ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
61982025-03-07T23:12:11.846ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
61992025-03-07T23:12:11.846ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
62002025-03-07T23:12:11.852ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62012025-03-07T23:12:11.852ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62022025-03-07T23:12:11.853ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62032025-03-07T23:12:11.857ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62042025-03-07T23:12:11.857ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62052025-03-07T23:12:11.858ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62062025-03-07T23:12:11.861ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62072025-03-07T23:12:11.861ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62082025-03-07T23:12:11.862ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62092025-03-07T23:12:11.866ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62102025-03-07T23:12:11.866ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62112025-03-07T23:12:11.866ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62122025-03-07T23:12:11.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62132025-03-07T23:12:11.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62142025-03-07T23:12:11.871ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62152025-03-07T23:12:11.872ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62162025-03-07T23:12:11.872ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62172025-03-07T23:12:11.872ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62182025-03-07T23:12:11.875ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62192025-03-07T23:12:11.876ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62202025-03-07T23:12:11.876ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62212025-03-07T23:12:11.877ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62222025-03-07T23:12:11.886ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62232025-03-07T23:12:11.904ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62242025-03-07T23:12:11.905ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62252025-03-07T23:12:11.905ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62262025-03-07T23:12:11.906ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62272025-03-07T23:12:11.906ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62282025-03-07T23:12:11.906ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62292025-03-07T23:12:11.912ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62302025-03-07T23:12:11.912ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62312025-03-07T23:12:11.912ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62322025-03-07T23:12:11.913ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62332025-03-07T23:12:11.917ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62342025-03-07T23:12:11.917ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62352025-03-07T23:12:11.917ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62362025-03-07T23:12:11.918ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62372025-03-07T23:12:11.922ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62382025-03-07T23:12:11.930ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62392025-03-07T23:12:11.931ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62402025-03-07T23:12:11.931ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62412025-03-07T23:12:11.933ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_node = FinalizeDiskRecord
62422025-03-07T23:12:11.951ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
62432025-03-07T23:12:11.951ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
62442025-03-07T23:12:11.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
62452025-03-07T23:12:11.960ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
62462025-03-07T23:12:11.968ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
62472025-03-07T23:12:11.969ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
62482025-03-07T23:12:11.975ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
62492025-03-07T23:12:11.975ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62
62502025-03-07T23:12:11.997ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
62512025-03-07T23:12:11.997ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 40e9e180-ced2-4b16-9ea6-dbe120db5c62 saga_name = disk-create saga_result = SagaResult { saga_id: 40e9e180-ced2-4b16-9ea6-dbe120db5c62, saga_log: SagaLog { saga_id: 40e9e180-ced2-4b16-9ea6-dbe120db5c62, unwinding: false, events: [N009 started, N009 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N010 started, N010 succeeded], node_status: {0: Succeeded(String("0c4001f0-f776-4e82-98bc-918ec9d357f4")), 1: Succeeded(String("9d5cd6fd-6069-4e10-a917-c714b823db74")), 2: Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:12:11.402651Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:11.402651Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:11.402650Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}), 3: Succeeded(Array [Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("babce11f-67c0-4261-ba5b-b14299523d56"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("8616586f-ac3f-42eb-9093-dcb9c7174450"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3a28c948-fca0-41b0-907e-b586cafc1227"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}]]), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Object {"block_size": Number(4096), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "key": String("DhZKipAjez5HFrN0ZUGH5KJlCxVxcyH4wZcUiSVb/4U="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1000"), String("[::1]:1100"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}), 7: Succeeded(Null), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"created_disk": Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:12:11.402651Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:11.402651Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:11.402650Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("babce11f-67c0-4261-ba5b-b14299523d56"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("8616586f-ac3f-42eb-9093-dcb9c7174450"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3a28c948-fca0-41b0-907e-b586cafc1227"), "time_created": String("2025-03-07T23:12:11.568158Z"), "time_modified": String("2025-03-07T23:12:11.568158Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")}]], "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "disk_runtime": Null, "no_result": Null, "regions_ensure": Object {"block_size": Number(4096), "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "key": String("DhZKipAjez5HFrN0ZUGH5KJlCxVxcyH4wZcUiSVb/4U="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1000"), String("[::1]:1100"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "volume_id": String("9d5cd6fd-6069-4e10-a917-c714b823db74")} }) }
62522025-03-07T23:12:11.998ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 735262 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73395c9b-d7af-4c31-9f1b-b7403f99c3ab response_code = 201 uri = /v1/disks?project=demo-project
62532025-03-07T23:12:11.998ZINFOtest_unauthorized (external client test context): client received response status = 201
62542025-03-07T23:12:11.998ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
62552025-03-07T23:12:11.999ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a uri = /v1/disks?project=demo-project
62562025-03-07T23:12:11.999ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a uri = /v1/disks?project=demo-project
62572025-03-07T23:12:11.999ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
62582025-03-07T23:12:11.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62592025-03-07T23:12:12.000ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62602025-03-07T23:12:12.000ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62612025-03-07T23:12:12.002ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62622025-03-07T23:12:12.003ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62632025-03-07T23:12:12.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62642025-03-07T23:12:12.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
62652025-03-07T23:12:12.005ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
62662025-03-07T23:12:12.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62672025-03-07T23:12:12.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62682025-03-07T23:12:12.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62692025-03-07T23:12:12.008ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
62702025-03-07T23:12:12.008ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62712025-03-07T23:12:12.008ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62722025-03-07T23:12:12.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62732025-03-07T23:12:12.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
62742025-03-07T23:12:12.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
62752025-03-07T23:12:12.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62762025-03-07T23:12:12.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62772025-03-07T23:12:12.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62782025-03-07T23:12:12.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
62792025-03-07T23:12:12.023ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
62802025-03-07T23:12:12.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62812025-03-07T23:12:12.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62822025-03-07T23:12:12.026ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62832025-03-07T23:12:12.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
62842025-03-07T23:12:12.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62852025-03-07T23:12:12.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62862025-03-07T23:12:12.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62872025-03-07T23:12:12.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
62882025-03-07T23:12:12.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
62892025-03-07T23:12:12.036ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a uri = /v1/disks?project=demo-project
62902025-03-07T23:12:12.036ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database uri = /v1/disks?project=demo-project
62912025-03-07T23:12:12.036ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
62922025-03-07T23:12:12.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
62932025-03-07T23:12:12.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database uri = /v1/disks?project=demo-project
62942025-03-07T23:12:12.049ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
62952025-03-07T23:12:12.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
62962025-03-07T23:12:12.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
62972025-03-07T23:12:12.056ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
62982025-03-07T23:12:12.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database uri = /v1/disks?project=demo-project
62992025-03-07T23:12:12.056ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63002025-03-07T23:12:12.057ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63012025-03-07T23:12:12.060ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
63022025-03-07T23:12:12.060ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database uri = /v1/disks?project=demo-project
63032025-03-07T23:12:12.060ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63042025-03-07T23:12:12.061ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63052025-03-07T23:12:12.069ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
63062025-03-07T23:12:12.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database uri = /v1/disks?project=demo-project
63072025-03-07T23:12:12.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63082025-03-07T23:12:12.069ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63092025-03-07T23:12:12.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
63102025-03-07T23:12:12.086ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
63112025-03-07T23:12:12.086ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create
63122025-03-07T23:12:12.109ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":12,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[11,0,null],[10,12,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateDiskId","name":"disk_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"disk_create.create_disk_record","label":"CreateDiskRecord","name":"created_disk"}},{"Action":{"action_name":"disk_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"disk_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"disk_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"disk_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"disk_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"disk_create.finalize_disk_record","label":"FinalizeDiskRecord","name":"disk_runtime"}},{"Action":{"action_name":"disk_create.get_pantry_address","label":"GetPantryAddress","name":"pantry_address"}},{"Action":{"action_name":"disk_create.call_pantry_attach_for_disk","label":"CallPantryAttachForDisk","name":"call_pantry_attach_for_disk"}},{"Start":{"params":{"create_params":{"description":"","disk_source":{"block_size":4096,"type":"importing_blocks"},"name":"demo-import-disk","size":2147483648},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"disk-create","start_node":11} saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63132025-03-07T23:12:12.110ZINFOtest_unauthorized (SecStore): creating saga saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create
63142025-03-07T23:12:12.122ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create
63152025-03-07T23:12:12.122ZINFOtest_unauthorized (SEC): saga start saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63162025-03-07T23:12:12.122ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63172025-03-07T23:12:12.122ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63182025-03-07T23:12:12.130ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63192025-03-07T23:12:12.130ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63202025-03-07T23:12:12.139ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63212025-03-07T23:12:12.139ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63222025-03-07T23:12:12.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63232025-03-07T23:12:12.146ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3")) node_id = 0 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63242025-03-07T23:12:12.153ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63252025-03-07T23:12:12.153ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63262025-03-07T23:12:12.161ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63272025-03-07T23:12:12.161ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")) node_id = 1 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63282025-03-07T23:12:12.170ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63292025-03-07T23:12:12.170ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63302025-03-07T23:12:12.177ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63312025-03-07T23:12:12.177ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63322025-03-07T23:12:12.177ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63332025-03-07T23:12:12.181ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63342025-03-07T23:12:12.181ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63352025-03-07T23:12:12.182ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63362025-03-07T23:12:12.189ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63372025-03-07T23:12:12.191ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63382025-03-07T23:12:12.191ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63392025-03-07T23:12:12.191ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63402025-03-07T23:12:12.191ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63412025-03-07T23:12:12.196ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63422025-03-07T23:12:12.196ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63432025-03-07T23:12:12.196ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63442025-03-07T23:12:12.197ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63452025-03-07T23:12:12.202ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63462025-03-07T23:12:12.202ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63472025-03-07T23:12:12.202ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63482025-03-07T23:12:12.203ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63492025-03-07T23:12:12.207ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63502025-03-07T23:12:12.231ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63512025-03-07T23:12:12.231ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63522025-03-07T23:12:12.231ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63532025-03-07T23:12:12.231ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63542025-03-07T23:12:12.231ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63552025-03-07T23:12:12.232ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63562025-03-07T23:12:12.235ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
63572025-03-07T23:12:12.235ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
63582025-03-07T23:12:12.235ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
63592025-03-07T23:12:12.238ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
63602025-03-07T23:12:12.246ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
63612025-03-07T23:12:12.246ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
63622025-03-07T23:12:12.246ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63632025-03-07T23:12:12.246ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63642025-03-07T23:12:12.246ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63652025-03-07T23:12:12.251ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63662025-03-07T23:12:12.256ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
63672025-03-07T23:12:12.256ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
63682025-03-07T23:12:12.257ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63692025-03-07T23:12:12.258ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63702025-03-07T23:12:12.259ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63712025-03-07T23:12:12.259ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63722025-03-07T23:12:12.263ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63732025-03-07T23:12:12.271ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63742025-03-07T23:12:12.272ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63752025-03-07T23:12:12.272ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63762025-03-07T23:12:12.272ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CreateDiskRecord
63772025-03-07T23:12:12.295ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63782025-03-07T23:12:12.296ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:12:12.176920Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:12.176920Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:12.176917Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}) node_id = 2 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63792025-03-07T23:12:12.316ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63802025-03-07T23:12:12.317ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63812025-03-07T23:12:12.325ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = RegionsAlloc
63822025-03-07T23:12:12.326ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = RegionsAlloc
63832025-03-07T23:12:12.327ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = RegionsAlloc
63842025-03-07T23:12:12.336ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
63852025-03-07T23:12:12.436ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 2520a1a7-480c-468a-a7fd-6a117269f106 (dataset), time_created: 2025-03-07T23:12:04.887848Z, time_modified: 2025-03-07T23:12:04.887848Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: bba3352f-4e07-4bd1-bdf7-5f4138416688, ip: ::1, port: SqlU16(36409), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 576954a5-5ca0-40f6-a665-6e46f34c0455, time_created: 2025-03-07T23:12:12.340756Z, time_modified: 2025-03-07T23:12:12.340756Z }, dataset_id: 2520a1a7-480c-468a-a7fd-6a117269f106 (dataset), volume_id: 7a2c6972-155f-4dae-a4b3-dba44a97abf1 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset), time_created: 2025-03-07T23:12:06.091041Z, time_modified: 2025-03-07T23:12:06.091041Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 59f70ac9-e265-4936-a82b-954ffc6689eb, ip: ::1, port: SqlU16(40767), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 780fb13f-205a-40e2-bc52-682a96253bc1, time_created: 2025-03-07T23:12:12.340756Z, time_modified: 2025-03-07T23:12:12.340756Z }, dataset_id: dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset), volume_id: 7a2c6972-155f-4dae-a4b3-dba44a97abf1 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), time_created: 2025-03-07T23:12:05.365939Z, time_modified: 2025-03-07T23:12:05.365939Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 25887b79-b28b-4171-99a8-6100028a7952, ip: ::1, port: SqlU16(37937), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 54127bb2-a51f-4df9-b2dc-69a08ddcf05a, time_created: 2025-03-07T23:12:12.340756Z, time_modified: 2025-03-07T23:12:12.340756Z }, dataset_id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), volume_id: 7a2c6972-155f-4dae-a4b3-dba44a97abf1 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 7a2c6972-155f-4dae-a4b3-dba44a97abf1
63862025-03-07T23:12:12.436ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63872025-03-07T23:12:12.436ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("576954a5-5ca0-40f6-a665-6e46f34c0455"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("780fb13f-205a-40e2-bc52-682a96253bc1"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("54127bb2-a51f-4df9-b2dc-69a08ddcf05a"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}]]) node_id = 3 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63882025-03-07T23:12:12.446ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63892025-03-07T23:12:12.447ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63902025-03-07T23:12:12.459ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = SpaceAccount
63912025-03-07T23:12:12.460ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = SpaceAccount
63922025-03-07T23:12:12.460ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = SpaceAccount
63932025-03-07T23:12:12.482ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63942025-03-07T23:12:12.483ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63952025-03-07T23:12:12.491ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63962025-03-07T23:12:12.492ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63972025-03-07T23:12:12.498ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
63982025-03-07T23:12:12.498ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
63992025-03-07T23:12:12.503ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64002025-03-07T23:12:12.503ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64012025-03-07T23:12:12.518ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = 4bc30fc6-bbfd-44b9-8d5b-854473dd43ff server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64022025-03-07T23:12:12.518ZINFOtest_unauthorized (SledAgent): created region 780fb13f-205a-40e2-bc52-682a96253bc1 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
64032025-03-07T23:12:12.518ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 542 local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = 4bc30fc6-bbfd-44b9-8d5b-854473dd43ff response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64042025-03-07T23:12:12.519ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:36409 remote_addr = [::1]:58244 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
64052025-03-07T23:12:12.521ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36409 method = POST remote_addr = [::1]:58244 req_id = 2597eee8-9ed3-4b3c-9176-62b34a554a6d server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64062025-03-07T23:12:12.521ZINFOtest_unauthorized (SledAgent): created region 576954a5-5ca0-40f6-a665-6e46f34c0455 end_port = 1100 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1050
64072025-03-07T23:12:12.521ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 384 local_addr = [::1]:36409 method = POST remote_addr = [::1]:58244 req_id = 2597eee8-9ed3-4b3c-9176-62b34a554a6d response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64082025-03-07T23:12:12.534ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 6fd51d94-c440-47c0-be73-aae22e25ec5f server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64092025-03-07T23:12:12.535ZINFOtest_unauthorized (SledAgent): created region 54127bb2-a51f-4df9-b2dc-69a08ddcf05a end_port = 1150 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1100
64102025-03-07T23:12:12.535ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 374 local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 6fd51d94-c440-47c0-be73-aae22e25ec5f response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64112025-03-07T23:12:12.575ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64122025-03-07T23:12:12.575ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "key": String("Y3la62SQb/coPL+U5+kntBvKHEaLuROxKtcmcZhJWPc="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1050"), String("[::1]:1101")]}, "type": String("region")}], "type": String("volume")}) node_id = 6 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64132025-03-07T23:12:12.591ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64142025-03-07T23:12:12.591ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64152025-03-07T23:12:12.591ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64162025-03-07T23:12:12.591ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64172025-03-07T23:12:12.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64182025-03-07T23:12:12.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64192025-03-07T23:12:12.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64202025-03-07T23:12:12.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
64212025-03-07T23:12:12.629ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64222025-03-07T23:12:12.629ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64232025-03-07T23:12:12.641ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64242025-03-07T23:12:12.642ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64252025-03-07T23:12:12.660ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64262025-03-07T23:12:12.660ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64272025-03-07T23:12:12.663ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64282025-03-07T23:12:12.665ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64292025-03-07T23:12:12.666ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64302025-03-07T23:12:12.666ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64312025-03-07T23:12:12.667ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64322025-03-07T23:12:12.671ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64332025-03-07T23:12:12.671ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64342025-03-07T23:12:12.703ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64352025-03-07T23:12:12.703ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64362025-03-07T23:12:12.703ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64372025-03-07T23:12:12.703ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64382025-03-07T23:12:12.704ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64392025-03-07T23:12:12.710ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64402025-03-07T23:12:12.710ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64412025-03-07T23:12:12.710ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64422025-03-07T23:12:12.710ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64432025-03-07T23:12:12.712ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64442025-03-07T23:12:12.712ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64452025-03-07T23:12:12.712ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64462025-03-07T23:12:12.714ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64472025-03-07T23:12:12.724ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64482025-03-07T23:12:12.731ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64492025-03-07T23:12:12.731ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64502025-03-07T23:12:12.731ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64512025-03-07T23:12:12.731ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64522025-03-07T23:12:12.731ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64532025-03-07T23:12:12.732ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64542025-03-07T23:12:12.735ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64552025-03-07T23:12:12.736ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64562025-03-07T23:12:12.736ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64572025-03-07T23:12:12.736ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64582025-03-07T23:12:12.741ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64592025-03-07T23:12:12.742ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64602025-03-07T23:12:12.742ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64612025-03-07T23:12:12.742ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64622025-03-07T23:12:12.755ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64632025-03-07T23:12:12.761ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64642025-03-07T23:12:12.761ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64652025-03-07T23:12:12.761ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64662025-03-07T23:12:12.762ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = FinalizeDiskRecord
64672025-03-07T23:12:12.793ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64682025-03-07T23:12:12.793ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64692025-03-07T23:12:12.801ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
64702025-03-07T23:12:12.801ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
64712025-03-07T23:12:12.809ZINFOtest_unauthorized (SagaExecutor): using pantry at [::1]:39045 for importing to disk 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create
64722025-03-07T23:12:12.809ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64732025-03-07T23:12:12.809ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64742025-03-07T23:12:12.810ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64752025-03-07T23:12:12.811ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 96a61baf-7c45-4bb1-97ae-85b4bff79bf8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
64762025-03-07T23:12:12.812ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 239 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 96a61baf-7c45-4bb1-97ae-85b4bff79bf8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
64772025-03-07T23:12:12.815ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64782025-03-07T23:12:12.815ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64792025-03-07T23:12:12.816ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64802025-03-07T23:12:12.817ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64812025-03-07T23:12:12.820ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64822025-03-07T23:12:12.820ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64832025-03-07T23:12:12.820ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64842025-03-07T23:12:12.820ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64852025-03-07T23:12:12.822ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64862025-03-07T23:12:12.822ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64872025-03-07T23:12:12.822ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64882025-03-07T23:12:12.840ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64892025-03-07T23:12:12.840ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64902025-03-07T23:12:12.840ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64912025-03-07T23:12:12.841ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64922025-03-07T23:12:12.844ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64932025-03-07T23:12:12.844ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64942025-03-07T23:12:12.845ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64952025-03-07T23:12:12.845ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64962025-03-07T23:12:12.848ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64972025-03-07T23:12:12.855ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64982025-03-07T23:12:12.855ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
64992025-03-07T23:12:12.855ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65002025-03-07T23:12:12.855ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65012025-03-07T23:12:12.855ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65022025-03-07T23:12:12.856ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65032025-03-07T23:12:12.859ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65042025-03-07T23:12:12.860ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65052025-03-07T23:12:12.860ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65062025-03-07T23:12:12.860ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65072025-03-07T23:12:12.863ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65082025-03-07T23:12:12.863ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65092025-03-07T23:12:12.864ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65102025-03-07T23:12:12.865ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65112025-03-07T23:12:12.869ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65122025-03-07T23:12:12.876ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65132025-03-07T23:12:12.880ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65142025-03-07T23:12:12.880ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65152025-03-07T23:12:12.880ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = GetPantryAddress
65162025-03-07T23:12:12.893ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65172025-03-07T23:12:12.894ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("[::1]:39045")) node_id = 9 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65182025-03-07T23:12:12.900ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65192025-03-07T23:12:12.902ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65202025-03-07T23:12:12.909ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65212025-03-07T23:12:12.909ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65222025-03-07T23:12:12.909ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65232025-03-07T23:12:12.914ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65242025-03-07T23:12:12.916ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65252025-03-07T23:12:12.918ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65262025-03-07T23:12:12.918ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65272025-03-07T23:12:12.919ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65282025-03-07T23:12:12.919ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65292025-03-07T23:12:12.920ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65302025-03-07T23:12:12.921ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65312025-03-07T23:12:12.921ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65322025-03-07T23:12:12.921ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65332025-03-07T23:12:12.921ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65342025-03-07T23:12:12.925ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65352025-03-07T23:12:12.933ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65362025-03-07T23:12:12.933ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65372025-03-07T23:12:12.933ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65382025-03-07T23:12:12.933ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65392025-03-07T23:12:12.933ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65402025-03-07T23:12:12.933ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65412025-03-07T23:12:12.933ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65422025-03-07T23:12:12.936ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65432025-03-07T23:12:12.942ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ById(6e8051cc-c280-4e8f-85ea-46ebfa72f7f3) } result = Ok(()) saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_node = CallPantryAttachForDisk
65442025-03-07T23:12:12.960ZINFOtest_unauthorized (SagaExecutor): sending attach request for 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3 to [::1]:39045 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create
65452025-03-07T23:12:12.993ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
65462025-03-07T23:12:12.995ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: a0 58 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .X..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:61708 req_id = 8b0c8350-abb7-4a60-9188-7063e5b91b01
65472025-03-07T23:12:12.995ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 41048,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61708 req_id = 8b0c8350-abb7-4a60-9188-7063e5b91b01
65482025-03-07T23:12:12.996ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
65492025-03-07T23:12:12.996ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
65502025-03-07T23:12:12.996ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:61708 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = 8b0c8350-abb7-4a60-9188-7063e5b91b01
65512025-03-07T23:12:12.997ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2817, tv_nsec: 774757636 } })
65522025-03-07T23:12:12.998ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
65532025-03-07T23:12:12.998ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: de 6c 01 00 00 01 00 00 00 00 00 01 24 30 65 36 .l..........$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:63872 req_id = 01824faf-2a1b-4cc9-8b5a-201d51f79c5a
65542025-03-07T23:12:12.998ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 56940,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63872 req_id = 01824faf-2a1b-4cc9-8b5a-201d51f79c5a
65552025-03-07T23:12:12.998ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
65562025-03-07T23:12:12.999ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:63872 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 01824faf-2a1b-4cc9-8b5a-201d51f79c5a
65572025-03-07T23:12:12.999ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54072 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
65582025-03-07T23:12:12.999ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = POST remote_addr = [::1]:54072 req_id = cf7b926d-be4d-4fda-9a95-031a6c86e034 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/6e8051cc-c280-4e8f-85ea-46ebfa72f7f3
65592025-03-07T23:12:13.003ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 471 local_addr = [::1]:39045 method = POST remote_addr = [::1]:54072 req_id = cf7b926d-be4d-4fda-9a95-031a6c86e034 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/6e8051cc-c280-4e8f-85ea-46ebfa72f7f3
65602025-03-07T23:12:13.008ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65612025-03-07T23:12:13.008ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65622025-03-07T23:12:13.011ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65632025-03-07T23:12:13.012ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65642025-03-07T23:12:13.034ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65652025-03-07T23:12:13.034ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65662025-03-07T23:12:13.052ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65672025-03-07T23:12:13.052ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9
65682025-03-07T23:12:13.076ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
65692025-03-07T23:12:13.078ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = c7351b44-1ac4-448c-9935-6a740aa52ef9 saga_name = disk-create saga_result = SagaResult { saga_id: c7351b44-1ac4-448c-9935-6a740aa52ef9, saga_log: SagaLog { saga_id: c7351b44-1ac4-448c-9935-6a740aa52ef9, unwinding: false, events: [N011 started, N011 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N012 started, N012 succeeded], node_status: {0: Succeeded(String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3")), 1: Succeeded(String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")), 2: Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:12:12.176920Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:12.176920Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:12.176917Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}), 3: Succeeded(Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("576954a5-5ca0-40f6-a665-6e46f34c0455"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("780fb13f-205a-40e2-bc52-682a96253bc1"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("54127bb2-a51f-4df9-b2dc-69a08ddcf05a"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}]]), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Object {"block_size": Number(4096), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "key": String("Y3la62SQb/coPL+U5+kntBvKHEaLuROxKtcmcZhJWPc="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1050"), String("[::1]:1101")]}, "type": String("region")}], "type": String("volume")}), 7: Succeeded(Null), 8: Succeeded(Null), 9: Succeeded(String("[::1]:39045")), 10: Succeeded(Null), 11: Succeeded(Null), 12: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"call_pantry_attach_for_disk": Null, "created_disk": Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:12:12.176920Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:12.176920Z")}, "pantry_address": Null, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:12:12.176917Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("576954a5-5ca0-40f6-a665-6e46f34c0455"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "time_created": String("2025-03-07T23:12:06.091041Z"), "time_modified": String("2025-03-07T23:12:06.091041Z")}, "ip": String("::1"), "pool_id": String("59f70ac9-e265-4936-a82b-954ffc6689eb"), "port": Number(40767), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("dfafd922-ff6f-46aa-896b-3058e64f8ce4"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("780fb13f-205a-40e2-bc52-682a96253bc1"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("54127bb2-a51f-4df9-b2dc-69a08ddcf05a"), "time_created": String("2025-03-07T23:12:12.340756Z"), "time_modified": String("2025-03-07T23:12:12.340756Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")}]], "disk_id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "disk_runtime": Null, "no_result": Null, "pantry_address": String("[::1]:39045"), "regions_ensure": Object {"block_size": Number(4096), "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("6e8051cc-c280-4e8f-85ea-46ebfa72f7f3"), "key": String("Y3la62SQb/coPL+U5+kntBvKHEaLuROxKtcmcZhJWPc="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1050"), String("[::1]:1101")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "volume_id": String("7a2c6972-155f-4dae-a4b3-dba44a97abf1")} }) }
65702025-03-07T23:12:13.078ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1077648 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1d06cb39-3da1-4e1e-81c9-8f37f35c562a response_code = 201 uri = /v1/disks?project=demo-project
65712025-03-07T23:12:13.078ZINFOtest_unauthorized (external client test context): client received response status = 201
65722025-03-07T23:12:13.078ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
65732025-03-07T23:12:13.078ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a uri = /v1/instances?project=demo-project
65742025-03-07T23:12:13.078ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a uri = /v1/instances?project=demo-project
65752025-03-07T23:12:13.078ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
65762025-03-07T23:12:13.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65772025-03-07T23:12:13.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
65782025-03-07T23:12:13.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
65792025-03-07T23:12:13.082ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65802025-03-07T23:12:13.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
65812025-03-07T23:12:13.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
65822025-03-07T23:12:13.086ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
65832025-03-07T23:12:13.088ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
65842025-03-07T23:12:13.088ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65852025-03-07T23:12:13.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
65862025-03-07T23:12:13.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
65872025-03-07T23:12:13.090ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
65882025-03-07T23:12:13.091ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65892025-03-07T23:12:13.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
65902025-03-07T23:12:13.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
65912025-03-07T23:12:13.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
65922025-03-07T23:12:13.095ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
65932025-03-07T23:12:13.095ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65942025-03-07T23:12:13.095ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
65952025-03-07T23:12:13.096ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
65962025-03-07T23:12:13.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
65972025-03-07T23:12:13.099ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
65982025-03-07T23:12:13.099ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
65992025-03-07T23:12:13.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66002025-03-07T23:12:13.099ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66012025-03-07T23:12:13.100ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
66022025-03-07T23:12:13.102ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66032025-03-07T23:12:13.103ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66042025-03-07T23:12:13.103ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66052025-03-07T23:12:13.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
66062025-03-07T23:12:13.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
66072025-03-07T23:12:13.116ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a uri = /v1/instances?project=demo-project
66082025-03-07T23:12:13.116ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66092025-03-07T23:12:13.116ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66102025-03-07T23:12:13.120ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66112025-03-07T23:12:13.126ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66122025-03-07T23:12:13.126ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66132025-03-07T23:12:13.128ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66142025-03-07T23:12:13.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
66152025-03-07T23:12:13.130ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
66162025-03-07T23:12:13.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66172025-03-07T23:12:13.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66182025-03-07T23:12:13.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66192025-03-07T23:12:13.136ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66202025-03-07T23:12:13.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66212025-03-07T23:12:13.136ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66222025-03-07T23:12:13.137ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66232025-03-07T23:12:13.140ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66242025-03-07T23:12:13.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66252025-03-07T23:12:13.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66262025-03-07T23:12:13.141ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66272025-03-07T23:12:13.147ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
66282025-03-07T23:12:13.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
66292025-03-07T23:12:13.156ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66302025-03-07T23:12:13.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66312025-03-07T23:12:13.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66322025-03-07T23:12:13.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66332025-03-07T23:12:13.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66342025-03-07T23:12:13.159ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66352025-03-07T23:12:13.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
66362025-03-07T23:12:13.161ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66372025-03-07T23:12:13.162ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66382025-03-07T23:12:13.162ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66392025-03-07T23:12:13.162ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66402025-03-07T23:12:13.164ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66412025-03-07T23:12:13.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66422025-03-07T23:12:13.166ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66432025-03-07T23:12:13.166ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66442025-03-07T23:12:13.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
66452025-03-07T23:12:13.182ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
66462025-03-07T23:12:13.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
66472025-03-07T23:12:13.183ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66482025-03-07T23:12:13.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66492025-03-07T23:12:13.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66502025-03-07T23:12:13.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66512025-03-07T23:12:13.186ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66522025-03-07T23:12:13.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66532025-03-07T23:12:13.187ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66542025-03-07T23:12:13.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66552025-03-07T23:12:13.191ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
66562025-03-07T23:12:13.194ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
66572025-03-07T23:12:13.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
66582025-03-07T23:12:13.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66592025-03-07T23:12:13.195ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66602025-03-07T23:12:13.214ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
66612025-03-07T23:12:13.215ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
66622025-03-07T23:12:13.215ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
66632025-03-07T23:12:13.215ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
66642025-03-07T23:12:13.216ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
66652025-03-07T23:12:13.222ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
66662025-03-07T23:12:13.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
66672025-03-07T23:12:13.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
66682025-03-07T23:12:13.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
66692025-03-07T23:12:13.225ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
66702025-03-07T23:12:13.226ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
66712025-03-07T23:12:13.226ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
66722025-03-07T23:12:13.226ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
66732025-03-07T23:12:13.227ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
66742025-03-07T23:12:13.232ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
66752025-03-07T23:12:13.232ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
66762025-03-07T23:12:13.243ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
66772025-03-07T23:12:13.243ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
66782025-03-07T23:12:13.259ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create
66792025-03-07T23:12:13.259ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"82888c06-1920-48a3-9e72-2ad13a44d89e","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"eeea0910-f957-48a1-9c1e-17cb926e59ee","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"f221b44c-f755-4825-822a-a7320a698728","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"231bcdf8-cb41-48a3-8b0f-3ff98951abb6","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"dd8547f1-a880-4a93-ab3f-693eb3724ead","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"9692d7ba-0beb-43a4-9b03-fabaa063ebe2","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"f653b89e-31b2-4c4d-9147-5e7d530dcf99","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"3e809831-3ae3-4407-bdb6-384c0a3b2662","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"ba2fe102-d4f1-46e8-9d3d-a82adb83960d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"a728f5fc-7f09-403e-9606-4793d53f4475","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"e750d2aa-4db5-4c3f-a83d-8e8b9437eb47","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"60a39e97-74e2-4feb-90a4-d5a233e2e501","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"4fe89908-fa22-49bc-b419-7688e4e30c9d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"d466894e-0aa0-497b-886b-5950ba1210c2","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"90abcd5b-e3a7-4673-9f27-4c1d7ce918c5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"88ba6e0d-af6a-4e31-b2a3-6e93fca3118f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"779c4c01-fc1f-4ebb-bed0-f53b7b9238ae","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"474b7611-bae4-4dec-9a7d-59bb54caafd4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"f9d26b85-0e99-4890-9e7c-3a4006db5c34","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"dfd273ad-0c82-46a0-af51-c2d2b60ec7c9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"1a950611-b245-4a0a-a7ae-55dc295384c8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"4e74203d-376a-4d55-9863-71155102e407","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"348f27fa-818d-4e13-8073-c297a7002128","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"2b4463b7-91e4-41a0-b310-3b51574da362","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"f7a5aa1f-2366-4eb0-b146-27e22c9dd8ab","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"fc8f9d84-e1e1-442f-90aa-77cc9ede7a18","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"82995ca6-ba7a-44f7-b042-03a99ca92c0d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"ffcfbf8c-61ca-4ca1-baa1-d72c7a61e33d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"e0717920-fb02-4508-bd3d-bb51ca1e90a0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"935c669e-79b4-4b42-859a-8bcb722ead7c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"53c28d3e-38aa-4890-b2d5-d8dd078d71ef","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"aac524e3-ec3f-4b1f-b28c-ca44e1979e63","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"3699c9b3-1a3a-4ab2-b423-754b5c1cb3bd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"de17a577-0b05-4e03-a55b-f7c45f01655a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"6a1a03dc-bdcc-48bf-9469-be6dc6cacfc8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"bea9208d-24bf-4d52-921a-f698f09b3f28","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"2b68e4b7-fa3b-4a69-81d6-64773ed266e3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"0ba256b7-fc39-46d6-93a0-bf510830a5f1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"bfa0a669-7ebd-42dc-b51d-cb8ebf4ba705","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","new_id":"2c791e02-44e8-434a-a279-94277b330be7","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167} saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66802025-03-07T23:12:13.261ZINFOtest_unauthorized (SecStore): creating saga saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create
66812025-03-07T23:12:13.285ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create
66822025-03-07T23:12:13.285ZINFOtest_unauthorized (SEC): saga start saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66832025-03-07T23:12:13.285ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66842025-03-07T23:12:13.285ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 167 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
66852025-03-07T23:12:13.294ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66862025-03-07T23:12:13.295ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 167 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
66872025-03-07T23:12:13.303ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66882025-03-07T23:12:13.303ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
66892025-03-07T23:12:13.309ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66902025-03-07T23:12:13.309ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e")) node_id = 0 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
66912025-03-07T23:12:13.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
66922025-03-07T23:12:13.323ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
66932025-03-07T23:12:13.323ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
66942025-03-07T23:12:13.330ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
66952025-03-07T23:12:13.330ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
66962025-03-07T23:12:13.331ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
66972025-03-07T23:12:13.333ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
66982025-03-07T23:12:13.333ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
66992025-03-07T23:12:13.334ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67002025-03-07T23:12:13.337ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67012025-03-07T23:12:13.338ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67022025-03-07T23:12:13.338ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67032025-03-07T23:12:13.338ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67042025-03-07T23:12:13.338ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67052025-03-07T23:12:13.345ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67062025-03-07T23:12:13.345ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67072025-03-07T23:12:13.345ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67082025-03-07T23:12:13.346ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67092025-03-07T23:12:13.349ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67102025-03-07T23:12:13.351ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67112025-03-07T23:12:13.351ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67122025-03-07T23:12:13.351ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67132025-03-07T23:12:13.352ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67142025-03-07T23:12:13.357ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67152025-03-07T23:12:13.358ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67162025-03-07T23:12:13.358ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67172025-03-07T23:12:13.358ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67182025-03-07T23:12:13.358ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67192025-03-07T23:12:13.358ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67202025-03-07T23:12:13.365ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67212025-03-07T23:12:13.365ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67222025-03-07T23:12:13.365ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67232025-03-07T23:12:13.366ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67242025-03-07T23:12:13.370ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67252025-03-07T23:12:13.370ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67262025-03-07T23:12:13.370ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67272025-03-07T23:12:13.371ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67282025-03-07T23:12:13.373ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67292025-03-07T23:12:13.380ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67302025-03-07T23:12:13.380ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67312025-03-07T23:12:13.380ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67322025-03-07T23:12:13.381ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateInstanceRecord
67332025-03-07T23:12:13.451ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67342025-03-07T23:12:13.451ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 1 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67352025-03-07T23:12:13.460ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67362025-03-07T23:12:13.460ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67372025-03-07T23:12:13.471ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67382025-03-07T23:12:13.471ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67392025-03-07T23:12:13.471ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67402025-03-07T23:12:13.478ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67412025-03-07T23:12:13.480ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67422025-03-07T23:12:13.480ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67432025-03-07T23:12:13.481ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67442025-03-07T23:12:13.481ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67452025-03-07T23:12:13.481ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67462025-03-07T23:12:13.481ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67472025-03-07T23:12:13.482ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67482025-03-07T23:12:13.500ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67492025-03-07T23:12:13.502ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67502025-03-07T23:12:13.502ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67512025-03-07T23:12:13.502ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67522025-03-07T23:12:13.504ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67532025-03-07T23:12:13.506ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67542025-03-07T23:12:13.507ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67552025-03-07T23:12:13.507ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67562025-03-07T23:12:13.507ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67572025-03-07T23:12:13.507ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67582025-03-07T23:12:13.507ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67592025-03-07T23:12:13.509ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67602025-03-07T23:12:13.509ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67612025-03-07T23:12:13.509ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67622025-03-07T23:12:13.510ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67632025-03-07T23:12:13.520ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67642025-03-07T23:12:13.524ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = AssociateSshKeys
67652025-03-07T23:12:13.524ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67662025-03-07T23:12:13.524ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67672025-03-07T23:12:13.534ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67682025-03-07T23:12:13.534ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67692025-03-07T23:12:13.540ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67702025-03-07T23:12:13.540ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82888c06-1920-48a3-9e72-2ad13a44d89e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 3 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67712025-03-07T23:12:13.549ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67722025-03-07T23:12:13.549ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67732025-03-07T23:12:13.555ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67742025-03-07T23:12:13.555ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67752025-03-07T23:12:13.565ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
67762025-03-07T23:12:13.565ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
67772025-03-07T23:12:13.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
67782025-03-07T23:12:13.572ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67792025-03-07T23:12:13.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0d5340ca-5aa8-4625-9125-af8d89e550e6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67802025-03-07T23:12:13.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0d5340ca-5aa8-4625-9125-af8d89e550e6 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67812025-03-07T23:12:13.573ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0d5340ca-5aa8-4625-9125-af8d89e550e6 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67822025-03-07T23:12:13.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0d5340ca-5aa8-4625-9125-af8d89e550e6 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67832025-03-07T23:12:13.575ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67842025-03-07T23:12:13.575ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67852025-03-07T23:12:13.576ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67862025-03-07T23:12:13.579ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6405 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0d5340ca-5aa8-4625-9125-af8d89e550e6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
67872025-03-07T23:12:13.583ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67882025-03-07T23:12:13.583ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67892025-03-07T23:12:13.585ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67902025-03-07T23:12:13.589ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67912025-03-07T23:12:13.589ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67922025-03-07T23:12:13.590ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
67932025-03-07T23:12:13.593ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67942025-03-07T23:12:13.593ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d5340ca-5aa8-4625-9125-af8d89e550e6", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:12 GMT"} })
67952025-03-07T23:12:13.594ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
67962025-03-07T23:12:13.594ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67972025-03-07T23:12:13.596ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 2459bd27-b726-4224-818b-f868af5ebe12 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
67982025-03-07T23:12:13.597ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 2459bd27-b726-4224-818b-f868af5ebe12 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
67992025-03-07T23:12:13.597ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 2459bd27-b726-4224-818b-f868af5ebe12 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
68002025-03-07T23:12:13.599ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 2459bd27-b726-4224-818b-f868af5ebe12 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
68012025-03-07T23:12:13.601ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68022025-03-07T23:12:13.602ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68032025-03-07T23:12:13.602ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68042025-03-07T23:12:13.602ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68052025-03-07T23:12:13.602ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68062025-03-07T23:12:13.609ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 10623 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 2459bd27-b726-4224-818b-f868af5ebe12 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
68072025-03-07T23:12:13.609ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68082025-03-07T23:12:13.609ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68092025-03-07T23:12:13.609ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68102025-03-07T23:12:13.609ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68112025-03-07T23:12:13.612ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68122025-03-07T23:12:13.612ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68132025-03-07T23:12:13.612ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68142025-03-07T23:12:13.613ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68152025-03-07T23:12:13.616ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68162025-03-07T23:12:13.623ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68172025-03-07T23:12:13.623ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68182025-03-07T23:12:13.623ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68192025-03-07T23:12:13.628ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68202025-03-07T23:12:13.635ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68212025-03-07T23:12:13.637ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68222025-03-07T23:12:13.637ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68232025-03-07T23:12:13.637ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68242025-03-07T23:12:13.637ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
68252025-03-07T23:12:13.638ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
68262025-03-07T23:12:13.638ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
68272025-03-07T23:12:13.639ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
68282025-03-07T23:12:13.639ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "2459bd27-b726-4224-818b-f868af5ebe12", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:13 GMT"} })
68292025-03-07T23:12:13.639ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
68302025-03-07T23:12:13.639ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68312025-03-07T23:12:13.639ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
68322025-03-07T23:12:13.639ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68332025-03-07T23:12:13.639ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68342025-03-07T23:12:13.639ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68352025-03-07T23:12:13.639ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68362025-03-07T23:12:13.641ZINFOtest_unauthorized (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:1025 local_addr = 127.0.0.1:35155 remote_addr = 127.0.0.1:50232
68372025-03-07T23:12:13.646ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 3eefa648-4a02-467d-ae07-47ee813f02f7 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68382025-03-07T23:12:13.685ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 40779 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 3eefa648-4a02-467d-ae07-47ee813f02f7 response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68392025-03-07T23:12:13.686ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68402025-03-07T23:12:13.686ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68412025-03-07T23:12:13.686ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68422025-03-07T23:12:13.687ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68432025-03-07T23:12:13.718ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68442025-03-07T23:12:13.720ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68452025-03-07T23:12:13.720ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
68462025-03-07T23:12:13.720ZDEBGtest_unauthorized (results-sink): inserting 41 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
68472025-03-07T23:12:13.720ZDEBGtest_unauthorized (results-sink-cluster): inserting 41 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
68482025-03-07T23:12:13.720ZDEBGtest_unauthorized (clickhouse-client): unrolling 41 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68492025-03-07T23:12:13.720ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68502025-03-07T23:12:13.720ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('integration_target:integration_metric') FORMAT Native;
68512025-03-07T23:12:13.720ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68522025-03-07T23:12:13.721ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68532025-03-07T23:12:13.721ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68542025-03-07T23:12:13.722ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68552025-03-07T23:12:13.722ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68562025-03-07T23:12:13.725ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68572025-03-07T23:12:13.725ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68582025-03-07T23:12:13.725ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68592025-03-07T23:12:13.726ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68602025-03-07T23:12:13.731ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68612025-03-07T23:12:13.731ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68622025-03-07T23:12:13.732ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68632025-03-07T23:12:13.732ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68642025-03-07T23:12:13.737ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68652025-03-07T23:12:13.737ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:13.720082308Z } timeseries_name = http_service:request_latency_histogram
68662025-03-07T23:12:13.750ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68672025-03-07T23:12:13.750ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
68682025-03-07T23:12:13.750ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68692025-03-07T23:12:13.763ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68702025-03-07T23:12:13.763ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68712025-03-07T23:12:13.763ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68722025-03-07T23:12:13.763ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68732025-03-07T23:12:13.764ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68742025-03-07T23:12:13.764ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68752025-03-07T23:12:13.765ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68762025-03-07T23:12:13.766ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:13.749977566Z } timeseries_name = collection_target:cpus_provisioned
68772025-03-07T23:12:13.766ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68782025-03-07T23:12:13.766ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
68792025-03-07T23:12:13.767ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68802025-03-07T23:12:13.767ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68812025-03-07T23:12:13.767ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68822025-03-07T23:12:13.768ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68832025-03-07T23:12:13.769ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68842025-03-07T23:12:13.769ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:13.766536586Z } timeseries_name = collection_target:ram_provisioned
68852025-03-07T23:12:13.769ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68862025-03-07T23:12:13.769ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
68872025-03-07T23:12:13.771ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68882025-03-07T23:12:13.774ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:13.769705248Z } timeseries_name = collection_target:virtual_disk_space_provisioned
68892025-03-07T23:12:13.787ZDEBGtest_unauthorized (clickhouse-client): inserting 4 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
68902025-03-07T23:12:13.790ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 6 n_rows = 4 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
68912025-03-07T23:12:13.790ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68922025-03-07T23:12:13.790ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68932025-03-07T23:12:13.791ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68942025-03-07T23:12:13.791ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68952025-03-07T23:12:13.794ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68962025-03-07T23:12:13.800ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68972025-03-07T23:12:13.800ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68982025-03-07T23:12:13.800ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
68992025-03-07T23:12:13.801ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69002025-03-07T23:12:13.801ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69012025-03-07T23:12:13.801ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69022025-03-07T23:12:13.807ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69032025-03-07T23:12:13.808ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69042025-03-07T23:12:13.808ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69052025-03-07T23:12:13.808ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69062025-03-07T23:12:13.810ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 34 sql = INSERT INTO oximeter.fields_string FORMAT Native
69072025-03-07T23:12:13.815ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69082025-03-07T23:12:13.816ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69092025-03-07T23:12:13.816ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69102025-03-07T23:12:13.816ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69112025-03-07T23:12:13.819ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 34 table_name = fields_string
69122025-03-07T23:12:13.819ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 16 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
69132025-03-07T23:12:13.823ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
69142025-03-07T23:12:13.825ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69152025-03-07T23:12:13.833ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69162025-03-07T23:12:13.833ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69172025-03-07T23:12:13.843ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69182025-03-07T23:12:13.843ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69192025-03-07T23:12:13.848ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 16 table_name = fields_u16
69202025-03-07T23:12:13.853ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 34 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
69212025-03-07T23:12:13.858ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 34 table_name = fields_uuid
69222025-03-07T23:12:13.858ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 16 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
69232025-03-07T23:12:13.866ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 16 table_name = measurements_histogramu64
69242025-03-07T23:12:13.866ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 25 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
69252025-03-07T23:12:13.874ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 25 table_name = measurements_i64
69262025-03-07T23:12:13.874ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
69272025-03-07T23:12:13.889ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69282025-03-07T23:12:13.889ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69292025-03-07T23:12:13.895ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateNetworkInterface0
69302025-03-07T23:12:13.905ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69312025-03-07T23:12:13.910ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69322025-03-07T23:12:13.919ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69332025-03-07T23:12:13.919ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69342025-03-07T23:12:13.927ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69352025-03-07T23:12:13.927ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69362025-03-07T23:12:13.933ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69372025-03-07T23:12:13.933ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69382025-03-07T23:12:13.940ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69392025-03-07T23:12:13.941ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("eeea0910-f957-48a1-9c1e-17cb926e59ee"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 7 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69402025-03-07T23:12:13.947ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69412025-03-07T23:12:13.948ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69422025-03-07T23:12:13.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69432025-03-07T23:12:13.958ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69442025-03-07T23:12:13.961ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69452025-03-07T23:12:13.962ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69462025-03-07T23:12:13.969ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69472025-03-07T23:12:13.969ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69482025-03-07T23:12:13.974ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69492025-03-07T23:12:13.975ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69502025-03-07T23:12:13.981ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69512025-03-07T23:12:13.988ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69522025-03-07T23:12:13.995ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69532025-03-07T23:12:13.996ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69542025-03-07T23:12:14.006ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69552025-03-07T23:12:14.007ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f221b44c-f755-4825-822a-a7320a698728"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 11 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69562025-03-07T23:12:14.019ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69572025-03-07T23:12:14.023ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69582025-03-07T23:12:14.030ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69592025-03-07T23:12:14.030ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69602025-03-07T23:12:14.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69612025-03-07T23:12:14.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69622025-03-07T23:12:14.045ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69632025-03-07T23:12:14.045ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69642025-03-07T23:12:14.055ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69652025-03-07T23:12:14.056ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69662025-03-07T23:12:14.064ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69672025-03-07T23:12:14.066ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69682025-03-07T23:12:14.072ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69692025-03-07T23:12:14.072ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69702025-03-07T23:12:14.081ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69712025-03-07T23:12:14.082ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("231bcdf8-cb41-48a3-8b0f-3ff98951abb6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 15 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69722025-03-07T23:12:14.089ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69732025-03-07T23:12:14.089ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69742025-03-07T23:12:14.102ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69752025-03-07T23:12:14.103ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69762025-03-07T23:12:14.107ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69772025-03-07T23:12:14.111ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69782025-03-07T23:12:14.121ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69792025-03-07T23:12:14.121ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69802025-03-07T23:12:14.129ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69812025-03-07T23:12:14.130ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69822025-03-07T23:12:14.136ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69832025-03-07T23:12:14.136ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69842025-03-07T23:12:14.146ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69852025-03-07T23:12:14.146ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69862025-03-07T23:12:14.153ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69872025-03-07T23:12:14.154ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dd8547f1-a880-4a93-ab3f-693eb3724ead"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 19 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69882025-03-07T23:12:14.160ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69892025-03-07T23:12:14.160ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69902025-03-07T23:12:14.172ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69912025-03-07T23:12:14.173ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69922025-03-07T23:12:14.183ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69932025-03-07T23:12:14.183ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69942025-03-07T23:12:14.205ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69952025-03-07T23:12:14.205ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69962025-03-07T23:12:14.215ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
69972025-03-07T23:12:14.215ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
69982025-03-07T23:12:14.218ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
69992025-03-07T23:12:14.218ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
70002025-03-07T23:12:14.224ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70012025-03-07T23:12:14.224ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70022025-03-07T23:12:14.231ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70032025-03-07T23:12:14.232ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70042025-03-07T23:12:14.237ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70052025-03-07T23:12:14.238ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("9692d7ba-0beb-43a4-9b03-fabaa063ebe2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 23 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70062025-03-07T23:12:14.244ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70072025-03-07T23:12:14.245ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 24 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70082025-03-07T23:12:14.249ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70092025-03-07T23:12:14.249ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 24 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70102025-03-07T23:12:14.254ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70112025-03-07T23:12:14.254ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 25 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70122025-03-07T23:12:14.259ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70132025-03-07T23:12:14.259ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 25 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70142025-03-07T23:12:14.272ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70152025-03-07T23:12:14.272ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 26 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70162025-03-07T23:12:14.278ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70172025-03-07T23:12:14.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 26 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70182025-03-07T23:12:14.285ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70192025-03-07T23:12:14.285ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 27 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70202025-03-07T23:12:14.292ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70212025-03-07T23:12:14.292ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f653b89e-31b2-4c4d-9147-5e7d530dcf99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 27 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70222025-03-07T23:12:14.307ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70232025-03-07T23:12:14.307ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 28 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70242025-03-07T23:12:14.319ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70252025-03-07T23:12:14.319ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 28 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70262025-03-07T23:12:14.328ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70272025-03-07T23:12:14.328ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 29 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70282025-03-07T23:12:14.339ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70292025-03-07T23:12:14.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 29 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70302025-03-07T23:12:14.343ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70312025-03-07T23:12:14.344ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 30 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70322025-03-07T23:12:14.350ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70332025-03-07T23:12:14.350ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 30 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70342025-03-07T23:12:14.357ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70352025-03-07T23:12:14.360ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 31 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70362025-03-07T23:12:14.364ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70372025-03-07T23:12:14.365ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3e809831-3ae3-4407-bdb6-384c0a3b2662"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 31 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70382025-03-07T23:12:14.377ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70392025-03-07T23:12:14.377ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 32 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70402025-03-07T23:12:14.383ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70412025-03-07T23:12:14.383ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 32 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70422025-03-07T23:12:14.391ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70432025-03-07T23:12:14.391ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 33 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70442025-03-07T23:12:14.397ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70452025-03-07T23:12:14.397ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 33 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70462025-03-07T23:12:14.404ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70472025-03-07T23:12:14.407ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 34 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70482025-03-07T23:12:14.411ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70492025-03-07T23:12:14.411ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 34 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70502025-03-07T23:12:14.418ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70512025-03-07T23:12:14.418ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 35 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70522025-03-07T23:12:14.425ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70532025-03-07T23:12:14.425ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("e83b7f38-4362-485e-90c1-ceb1db1d2f49")) node_id = 35 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70542025-03-07T23:12:14.432ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70552025-03-07T23:12:14.432ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 36 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70562025-03-07T23:12:14.439ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70572025-03-07T23:12:14.439ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70582025-03-07T23:12:14.440ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70592025-03-07T23:12:14.443ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70602025-03-07T23:12:14.444ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70612025-03-07T23:12:14.444ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateSnatIp
70622025-03-07T23:12:14.474ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70632025-03-07T23:12:14.474ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 36 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70642025-03-07T23:12:14.484ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70652025-03-07T23:12:14.484ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 37 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70662025-03-07T23:12:14.491ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70672025-03-07T23:12:14.491ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 37 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70682025-03-07T23:12:14.501ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70692025-03-07T23:12:14.501ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 38 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70702025-03-07T23:12:14.508ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70712025-03-07T23:12:14.508ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 38 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70722025-03-07T23:12:14.515ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
70732025-03-07T23:12:14.515ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 39 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
70742025-03-07T23:12:14.522ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70752025-03-07T23:12:14.523ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70762025-03-07T23:12:14.523ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70772025-03-07T23:12:14.524ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70782025-03-07T23:12:14.525ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70792025-03-07T23:12:14.525ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70802025-03-07T23:12:14.525ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70812025-03-07T23:12:14.525ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70822025-03-07T23:12:14.527ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70832025-03-07T23:12:14.529ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70842025-03-07T23:12:14.529ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70852025-03-07T23:12:14.529ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70862025-03-07T23:12:14.530ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70872025-03-07T23:12:14.533ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70882025-03-07T23:12:14.534ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70892025-03-07T23:12:14.534ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70902025-03-07T23:12:14.534ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70912025-03-07T23:12:14.534ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70922025-03-07T23:12:14.536ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70932025-03-07T23:12:14.537ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70942025-03-07T23:12:14.538ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70952025-03-07T23:12:14.538ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70962025-03-07T23:12:14.538ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
70972025-03-07T23:12:14.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
70982025-03-07T23:12:14.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
70992025-03-07T23:12:14.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71002025-03-07T23:12:14.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71012025-03-07T23:12:14.595ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71022025-03-07T23:12:14.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71032025-03-07T23:12:14.675ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71042025-03-07T23:12:14.675ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71052025-03-07T23:12:14.676ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71062025-03-07T23:12:14.743ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71072025-03-07T23:12:14.744ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71082025-03-07T23:12:14.744ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71092025-03-07T23:12:14.745ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71102025-03-07T23:12:14.746ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71112025-03-07T23:12:14.746ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_node = CreateExternalIp0
71122025-03-07T23:12:14.880ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71132025-03-07T23:12:14.880ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}) node_id = 39 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71142025-03-07T23:12:14.886ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71152025-03-07T23:12:14.886ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 40 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71162025-03-07T23:12:14.893ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71172025-03-07T23:12:14.893ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}) node_id = 40 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71182025-03-07T23:12:14.899ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71192025-03-07T23:12:14.899ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 41 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71202025-03-07T23:12:14.909ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71212025-03-07T23:12:14.909ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("a728f5fc-7f09-403e-9606-4793d53f4475"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 41 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71222025-03-07T23:12:14.915ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71232025-03-07T23:12:14.915ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 42 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71242025-03-07T23:12:14.925ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71252025-03-07T23:12:14.925ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 42 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71262025-03-07T23:12:14.939ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71272025-03-07T23:12:14.939ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 43 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71282025-03-07T23:12:14.946ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71292025-03-07T23:12:14.949ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 43 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71302025-03-07T23:12:14.954ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71312025-03-07T23:12:14.954ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 44 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71322025-03-07T23:12:14.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71332025-03-07T23:12:14.960ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 44 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71342025-03-07T23:12:14.970ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71352025-03-07T23:12:14.970ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 45 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71362025-03-07T23:12:14.976ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71372025-03-07T23:12:14.977ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e750d2aa-4db5-4c3f-a83d-8e8b9437eb47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 45 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71382025-03-07T23:12:14.984ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71392025-03-07T23:12:14.984ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 46 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71402025-03-07T23:12:14.995ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71412025-03-07T23:12:14.997ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 46 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71422025-03-07T23:12:15.009ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71432025-03-07T23:12:15.009ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 47 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71442025-03-07T23:12:15.016ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71452025-03-07T23:12:15.016ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 47 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71462025-03-07T23:12:15.022ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71472025-03-07T23:12:15.022ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 48 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71482025-03-07T23:12:15.033ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71492025-03-07T23:12:15.033ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 48 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71502025-03-07T23:12:15.040ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71512025-03-07T23:12:15.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 49 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71522025-03-07T23:12:15.055ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71532025-03-07T23:12:15.056ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("60a39e97-74e2-4feb-90a4-d5a233e2e501"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 49 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71542025-03-07T23:12:15.061ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71552025-03-07T23:12:15.062ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 50 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71562025-03-07T23:12:15.066ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71572025-03-07T23:12:15.066ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 50 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71582025-03-07T23:12:15.072ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71592025-03-07T23:12:15.072ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 51 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71602025-03-07T23:12:15.078ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71612025-03-07T23:12:15.079ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 51 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71622025-03-07T23:12:15.084ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71632025-03-07T23:12:15.085ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 52 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71642025-03-07T23:12:15.091ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71652025-03-07T23:12:15.091ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 52 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71662025-03-07T23:12:15.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71672025-03-07T23:12:15.098ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 53 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71682025-03-07T23:12:15.104ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71692025-03-07T23:12:15.104ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4fe89908-fa22-49bc-b419-7688e4e30c9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 53 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71702025-03-07T23:12:15.120ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71712025-03-07T23:12:15.120ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 54 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71722025-03-07T23:12:15.128ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71732025-03-07T23:12:15.132ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 54 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71742025-03-07T23:12:15.134ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71752025-03-07T23:12:15.135ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 55 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71762025-03-07T23:12:15.139ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71772025-03-07T23:12:15.139ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 55 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71782025-03-07T23:12:15.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71792025-03-07T23:12:15.146ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 56 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71802025-03-07T23:12:15.151ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71812025-03-07T23:12:15.152ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 56 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71822025-03-07T23:12:15.158ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71832025-03-07T23:12:15.158ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 57 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71842025-03-07T23:12:15.165ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71852025-03-07T23:12:15.165ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("d466894e-0aa0-497b-886b-5950ba1210c2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 57 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71862025-03-07T23:12:15.173ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71872025-03-07T23:12:15.173ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 58 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71882025-03-07T23:12:15.193ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71892025-03-07T23:12:15.194ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 58 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71902025-03-07T23:12:15.210ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71912025-03-07T23:12:15.210ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 59 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71922025-03-07T23:12:15.217ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71932025-03-07T23:12:15.217ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 59 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
71942025-03-07T23:12:15.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
71952025-03-07T23:12:15.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
71962025-03-07T23:12:15.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
71972025-03-07T23:12:15.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
71982025-03-07T23:12:15.227ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
71992025-03-07T23:12:15.227ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 60 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72002025-03-07T23:12:15.227ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
72012025-03-07T23:12:15.227ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
72022025-03-07T23:12:15.229ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
72032025-03-07T23:12:15.230ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
72042025-03-07T23:12:15.232ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72052025-03-07T23:12:15.232ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 60 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72062025-03-07T23:12:15.239ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72072025-03-07T23:12:15.239ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 61 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72082025-03-07T23:12:15.246ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72092025-03-07T23:12:15.246ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("90abcd5b-e3a7-4673-9f27-4c1d7ce918c5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 61 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72102025-03-07T23:12:15.253ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72112025-03-07T23:12:15.254ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 62 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72122025-03-07T23:12:15.264ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72132025-03-07T23:12:15.264ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 62 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72142025-03-07T23:12:15.270ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72152025-03-07T23:12:15.270ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 63 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72162025-03-07T23:12:15.276ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72172025-03-07T23:12:15.276ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 63 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72182025-03-07T23:12:15.283ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72192025-03-07T23:12:15.283ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 64 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72202025-03-07T23:12:15.291ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72212025-03-07T23:12:15.292ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 64 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72222025-03-07T23:12:15.299ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72232025-03-07T23:12:15.302ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 65 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72242025-03-07T23:12:15.305ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72252025-03-07T23:12:15.306ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("88ba6e0d-af6a-4e31-b2a3-6e93fca3118f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 65 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72262025-03-07T23:12:15.315ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72272025-03-07T23:12:15.315ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 66 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72282025-03-07T23:12:15.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
72292025-03-07T23:12:15.323ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72302025-03-07T23:12:15.323ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 66 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72312025-03-07T23:12:15.333ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72322025-03-07T23:12:15.333ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 67 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72332025-03-07T23:12:15.340ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72342025-03-07T23:12:15.340ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 67 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72352025-03-07T23:12:15.346ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72362025-03-07T23:12:15.346ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 68 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72372025-03-07T23:12:15.354ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72382025-03-07T23:12:15.356ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 68 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72392025-03-07T23:12:15.362ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72402025-03-07T23:12:15.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 69 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72412025-03-07T23:12:15.370ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72422025-03-07T23:12:15.370ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("779c4c01-fc1f-4ebb-bed0-f53b7b9238ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}) node_id = 69 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72432025-03-07T23:12:15.376ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72442025-03-07T23:12:15.377ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 70 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72452025-03-07T23:12:15.391ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72462025-03-07T23:12:15.391ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 70 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72472025-03-07T23:12:15.399ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72482025-03-07T23:12:15.399ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 71 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72492025-03-07T23:12:15.406ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72502025-03-07T23:12:15.406ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 71 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72512025-03-07T23:12:15.412ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72522025-03-07T23:12:15.412ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 72 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72532025-03-07T23:12:15.420ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72542025-03-07T23:12:15.420ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 72 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72552025-03-07T23:12:15.426ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72562025-03-07T23:12:15.427ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 73 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72572025-03-07T23:12:15.441ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72582025-03-07T23:12:15.441ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("474b7611-bae4-4dec-9a7d-59bb54caafd4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}) node_id = 73 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72592025-03-07T23:12:15.449ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72602025-03-07T23:12:15.449ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 74 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72612025-03-07T23:12:15.465ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72622025-03-07T23:12:15.465ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 74 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72632025-03-07T23:12:15.474ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72642025-03-07T23:12:15.475ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 75 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72652025-03-07T23:12:15.480ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72662025-03-07T23:12:15.481ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 75 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72672025-03-07T23:12:15.489ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72682025-03-07T23:12:15.489ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 76 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72692025-03-07T23:12:15.497ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72702025-03-07T23:12:15.497ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 76 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72712025-03-07T23:12:15.504ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72722025-03-07T23:12:15.504ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 77 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72732025-03-07T23:12:15.512ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72742025-03-07T23:12:15.512ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f9d26b85-0e99-4890-9e7c-3a4006db5c34"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}) node_id = 77 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72752025-03-07T23:12:15.518ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72762025-03-07T23:12:15.518ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 78 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72772025-03-07T23:12:15.522ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72782025-03-07T23:12:15.522ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 78 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72792025-03-07T23:12:15.530ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72802025-03-07T23:12:15.532ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 79 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72812025-03-07T23:12:15.540ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72822025-03-07T23:12:15.541ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 79 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72832025-03-07T23:12:15.547ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72842025-03-07T23:12:15.547ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 80 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72852025-03-07T23:12:15.552ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72862025-03-07T23:12:15.552ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 80 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72872025-03-07T23:12:15.558ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72882025-03-07T23:12:15.558ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 81 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72892025-03-07T23:12:15.564ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72902025-03-07T23:12:15.564ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dfd273ad-0c82-46a0-af51-c2d2b60ec7c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}) node_id = 81 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72912025-03-07T23:12:15.572ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
72922025-03-07T23:12:15.572ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 82 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
72932025-03-07T23:12:15.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
72942025-03-07T23:12:15.572ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
72952025-03-07T23:12:15.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = efc57708-c245-4f42-94a9-f2f7db263bfb uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
72962025-03-07T23:12:15.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = efc57708-c245-4f42-94a9-f2f7db263bfb resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
72972025-03-07T23:12:15.573ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = efc57708-c245-4f42-94a9-f2f7db263bfb roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
72982025-03-07T23:12:15.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = efc57708-c245-4f42-94a9-f2f7db263bfb resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
72992025-03-07T23:12:15.576ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3060 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = efc57708-c245-4f42-94a9-f2f7db263bfb response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
73002025-03-07T23:12:15.576ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "efc57708-c245-4f42-94a9-f2f7db263bfb", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:15 GMT"} })
73012025-03-07T23:12:15.577ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73022025-03-07T23:12:15.577ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4d4095ed-416c-4bf4-b6d0-4b160be0d056 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73032025-03-07T23:12:15.578ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4d4095ed-416c-4bf4-b6d0-4b160be0d056 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73042025-03-07T23:12:15.578ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4d4095ed-416c-4bf4-b6d0-4b160be0d056 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73052025-03-07T23:12:15.578ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4d4095ed-416c-4bf4-b6d0-4b160be0d056 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73062025-03-07T23:12:15.579ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73072025-03-07T23:12:15.580ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 82 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73082025-03-07T23:12:15.580ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 2914 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 4d4095ed-416c-4bf4-b6d0-4b160be0d056 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
73092025-03-07T23:12:15.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "4d4095ed-416c-4bf4-b6d0-4b160be0d056", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:15 GMT"} })
73102025-03-07T23:12:15.581ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73112025-03-07T23:12:15.582ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73122025-03-07T23:12:15.582ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
73132025-03-07T23:12:15.585ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73142025-03-07T23:12:15.587ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 83 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73152025-03-07T23:12:15.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73162025-03-07T23:12:15.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73172025-03-07T23:12:15.589ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73182025-03-07T23:12:15.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73192025-03-07T23:12:15.590ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73202025-03-07T23:12:15.590ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
73212025-03-07T23:12:15.591ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73222025-03-07T23:12:15.595ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 83 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73232025-03-07T23:12:15.598ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73242025-03-07T23:12:15.599ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 84 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73252025-03-07T23:12:15.611ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73262025-03-07T23:12:15.613ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 84 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73272025-03-07T23:12:15.617ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73282025-03-07T23:12:15.618ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 85 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73292025-03-07T23:12:15.623ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73302025-03-07T23:12:15.623ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("1a950611-b245-4a0a-a7ae-55dc295384c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}) node_id = 85 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73312025-03-07T23:12:15.629ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73322025-03-07T23:12:15.629ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 86 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73332025-03-07T23:12:15.634ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73342025-03-07T23:12:15.635ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 86 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73352025-03-07T23:12:15.648ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73362025-03-07T23:12:15.649ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 87 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73372025-03-07T23:12:15.656ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73382025-03-07T23:12:15.656ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 87 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73392025-03-07T23:12:15.661ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73402025-03-07T23:12:15.663ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 88 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73412025-03-07T23:12:15.668ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73422025-03-07T23:12:15.668ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 88 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73432025-03-07T23:12:15.673ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73442025-03-07T23:12:15.673ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 89 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73452025-03-07T23:12:15.679ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73462025-03-07T23:12:15.680ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4e74203d-376a-4d55-9863-71155102e407"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}) node_id = 89 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73472025-03-07T23:12:15.686ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73482025-03-07T23:12:15.686ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 90 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73492025-03-07T23:12:15.693ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73502025-03-07T23:12:15.698ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 90 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73512025-03-07T23:12:15.702ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73522025-03-07T23:12:15.702ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 91 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73532025-03-07T23:12:15.709ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73542025-03-07T23:12:15.710ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 91 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73552025-03-07T23:12:15.719ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73562025-03-07T23:12:15.720ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 92 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73572025-03-07T23:12:15.729ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73582025-03-07T23:12:15.730ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 92 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73592025-03-07T23:12:15.737ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73602025-03-07T23:12:15.737ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 93 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73612025-03-07T23:12:15.742ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73622025-03-07T23:12:15.742ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("348f27fa-818d-4e13-8073-c297a7002128"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}) node_id = 93 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73632025-03-07T23:12:15.750ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73642025-03-07T23:12:15.750ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 94 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73652025-03-07T23:12:15.765ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73662025-03-07T23:12:15.765ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 94 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73672025-03-07T23:12:15.779ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73682025-03-07T23:12:15.779ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 95 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73692025-03-07T23:12:15.792ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73702025-03-07T23:12:15.793ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 95 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73712025-03-07T23:12:15.819ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73722025-03-07T23:12:15.820ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 96 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73732025-03-07T23:12:15.834ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73742025-03-07T23:12:15.839ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 96 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73752025-03-07T23:12:15.843ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73762025-03-07T23:12:15.843ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 97 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73772025-03-07T23:12:15.855ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73782025-03-07T23:12:15.856ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b4463b7-91e4-41a0-b310-3b51574da362"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}) node_id = 97 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73792025-03-07T23:12:15.862ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73802025-03-07T23:12:15.863ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 98 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73812025-03-07T23:12:15.872ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73822025-03-07T23:12:15.872ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 98 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73832025-03-07T23:12:15.882ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73842025-03-07T23:12:15.882ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 99 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73852025-03-07T23:12:15.893ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73862025-03-07T23:12:15.893ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 99 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73872025-03-07T23:12:15.899ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73882025-03-07T23:12:15.899ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 100 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73892025-03-07T23:12:15.908ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73902025-03-07T23:12:15.909ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 100 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73912025-03-07T23:12:15.915ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73922025-03-07T23:12:15.916ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 101 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73932025-03-07T23:12:15.924ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73942025-03-07T23:12:15.925ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f7a5aa1f-2366-4eb0-b146-27e22c9dd8ab"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}) node_id = 101 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73952025-03-07T23:12:15.931ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73962025-03-07T23:12:15.932ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 102 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73972025-03-07T23:12:15.938ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
73982025-03-07T23:12:15.938ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 102 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
73992025-03-07T23:12:15.947ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74002025-03-07T23:12:15.947ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 103 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74012025-03-07T23:12:15.958ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74022025-03-07T23:12:15.959ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 103 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74032025-03-07T23:12:15.964ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74042025-03-07T23:12:15.964ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 104 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74052025-03-07T23:12:15.972ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74062025-03-07T23:12:15.973ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 104 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74072025-03-07T23:12:15.980ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74082025-03-07T23:12:15.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 105 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74092025-03-07T23:12:15.993ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74102025-03-07T23:12:15.993ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("fc8f9d84-e1e1-442f-90aa-77cc9ede7a18"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}) node_id = 105 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74112025-03-07T23:12:15.999ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74122025-03-07T23:12:16.001ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 106 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74132025-03-07T23:12:16.006ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74142025-03-07T23:12:16.011ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 106 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74152025-03-07T23:12:16.013ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74162025-03-07T23:12:16.013ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 107 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74172025-03-07T23:12:16.027ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74182025-03-07T23:12:16.028ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 107 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74192025-03-07T23:12:16.034ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74202025-03-07T23:12:16.034ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 108 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74212025-03-07T23:12:16.040ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74222025-03-07T23:12:16.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 108 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74232025-03-07T23:12:16.046ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74242025-03-07T23:12:16.046ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 109 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74252025-03-07T23:12:16.051ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74262025-03-07T23:12:16.051ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82995ca6-ba7a-44f7-b042-03a99ca92c0d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}) node_id = 109 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74272025-03-07T23:12:16.057ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74282025-03-07T23:12:16.057ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 110 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74292025-03-07T23:12:16.064ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74302025-03-07T23:12:16.065ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 110 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74312025-03-07T23:12:16.074ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74322025-03-07T23:12:16.074ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 111 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74332025-03-07T23:12:16.081ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74342025-03-07T23:12:16.081ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 111 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74352025-03-07T23:12:16.096ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74362025-03-07T23:12:16.100ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 112 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74372025-03-07T23:12:16.107ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74382025-03-07T23:12:16.107ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 112 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74392025-03-07T23:12:16.114ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74402025-03-07T23:12:16.115ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 113 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74412025-03-07T23:12:16.133ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74422025-03-07T23:12:16.134ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ffcfbf8c-61ca-4ca1-baa1-d72c7a61e33d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}) node_id = 113 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74432025-03-07T23:12:16.137ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74442025-03-07T23:12:16.137ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 114 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74452025-03-07T23:12:16.146ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74462025-03-07T23:12:16.147ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 114 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74472025-03-07T23:12:16.173ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74482025-03-07T23:12:16.173ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 115 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74492025-03-07T23:12:16.184ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74502025-03-07T23:12:16.184ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 115 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74512025-03-07T23:12:16.196ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74522025-03-07T23:12:16.196ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 116 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74532025-03-07T23:12:16.208ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74542025-03-07T23:12:16.208ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 116 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74552025-03-07T23:12:16.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
74562025-03-07T23:12:16.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
74572025-03-07T23:12:16.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
74582025-03-07T23:12:16.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
74592025-03-07T23:12:16.224ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74602025-03-07T23:12:16.224ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 117 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74612025-03-07T23:12:16.234ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
74622025-03-07T23:12:16.234ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
74632025-03-07T23:12:16.235ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74642025-03-07T23:12:16.235ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e0717920-fb02-4508-bd3d-bb51ca1e90a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}) node_id = 117 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74652025-03-07T23:12:16.237ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
74662025-03-07T23:12:16.238ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
74672025-03-07T23:12:16.243ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74682025-03-07T23:12:16.244ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 118 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74692025-03-07T23:12:16.254ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74702025-03-07T23:12:16.258ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 118 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74712025-03-07T23:12:16.263ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74722025-03-07T23:12:16.263ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 119 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74732025-03-07T23:12:16.274ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74742025-03-07T23:12:16.275ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 119 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74752025-03-07T23:12:16.287ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74762025-03-07T23:12:16.287ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 120 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74772025-03-07T23:12:16.293ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74782025-03-07T23:12:16.294ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 120 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74792025-03-07T23:12:16.303ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74802025-03-07T23:12:16.304ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 121 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74812025-03-07T23:12:16.310ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74822025-03-07T23:12:16.310ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("935c669e-79b4-4b42-859a-8bcb722ead7c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}) node_id = 121 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74832025-03-07T23:12:16.318ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74842025-03-07T23:12:16.318ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 122 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74852025-03-07T23:12:16.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
74862025-03-07T23:12:16.328ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74872025-03-07T23:12:16.328ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 122 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74882025-03-07T23:12:16.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74892025-03-07T23:12:16.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 123 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74902025-03-07T23:12:16.348ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74912025-03-07T23:12:16.351ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 123 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74922025-03-07T23:12:16.361ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74932025-03-07T23:12:16.361ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 124 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74942025-03-07T23:12:16.368ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74952025-03-07T23:12:16.368ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 124 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74962025-03-07T23:12:16.376ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74972025-03-07T23:12:16.376ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 125 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
74982025-03-07T23:12:16.381ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
74992025-03-07T23:12:16.382ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("53c28d3e-38aa-4890-b2d5-d8dd078d71ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}) node_id = 125 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75002025-03-07T23:12:16.391ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75012025-03-07T23:12:16.392ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 126 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75022025-03-07T23:12:16.397ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75032025-03-07T23:12:16.398ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 126 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75042025-03-07T23:12:16.402ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75052025-03-07T23:12:16.402ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 127 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75062025-03-07T23:12:16.410ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75072025-03-07T23:12:16.410ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 127 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75082025-03-07T23:12:16.417ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75092025-03-07T23:12:16.418ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 128 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75102025-03-07T23:12:16.423ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75112025-03-07T23:12:16.424ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 128 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75122025-03-07T23:12:16.430ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75132025-03-07T23:12:16.430ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 129 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75142025-03-07T23:12:16.443ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75152025-03-07T23:12:16.444ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("aac524e3-ec3f-4b1f-b28c-ca44e1979e63"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}) node_id = 129 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75162025-03-07T23:12:16.449ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75172025-03-07T23:12:16.449ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 130 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75182025-03-07T23:12:16.457ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75192025-03-07T23:12:16.457ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 130 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75202025-03-07T23:12:16.462ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75212025-03-07T23:12:16.462ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 131 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75222025-03-07T23:12:16.468ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75232025-03-07T23:12:16.468ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 131 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75242025-03-07T23:12:16.475ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75252025-03-07T23:12:16.475ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 132 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75262025-03-07T23:12:16.493ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75272025-03-07T23:12:16.494ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 132 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75282025-03-07T23:12:16.501ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75292025-03-07T23:12:16.502ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 133 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75302025-03-07T23:12:16.508ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75312025-03-07T23:12:16.508ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3699c9b3-1a3a-4ab2-b423-754b5c1cb3bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}) node_id = 133 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75322025-03-07T23:12:16.515ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75332025-03-07T23:12:16.515ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 134 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75342025-03-07T23:12:16.520ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75352025-03-07T23:12:16.520ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 134 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75362025-03-07T23:12:16.526ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75372025-03-07T23:12:16.526ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 135 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75382025-03-07T23:12:16.533ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75392025-03-07T23:12:16.533ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 135 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75402025-03-07T23:12:16.544ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75412025-03-07T23:12:16.544ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 136 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75422025-03-07T23:12:16.553ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75432025-03-07T23:12:16.553ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 136 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75442025-03-07T23:12:16.559ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75452025-03-07T23:12:16.559ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 137 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75462025-03-07T23:12:16.567ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75472025-03-07T23:12:16.567ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("de17a577-0b05-4e03-a55b-f7c45f01655a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}) node_id = 137 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75482025-03-07T23:12:16.574ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75492025-03-07T23:12:16.574ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 138 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75502025-03-07T23:12:16.580ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75512025-03-07T23:12:16.581ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 138 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75522025-03-07T23:12:16.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75532025-03-07T23:12:16.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75542025-03-07T23:12:16.590ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75552025-03-07T23:12:16.590ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 139 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75562025-03-07T23:12:16.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75572025-03-07T23:12:16.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75582025-03-07T23:12:16.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75592025-03-07T23:12:16.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75602025-03-07T23:12:16.597ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75612025-03-07T23:12:16.597ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 139 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75622025-03-07T23:12:16.603ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75632025-03-07T23:12:16.603ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 140 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75642025-03-07T23:12:16.611ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75652025-03-07T23:12:16.611ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 140 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75662025-03-07T23:12:16.617ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75672025-03-07T23:12:16.618ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 141 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75682025-03-07T23:12:16.622ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75692025-03-07T23:12:16.622ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("6a1a03dc-bdcc-48bf-9469-be6dc6cacfc8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}) node_id = 141 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75702025-03-07T23:12:16.628ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75712025-03-07T23:12:16.628ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 142 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75722025-03-07T23:12:16.636ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75732025-03-07T23:12:16.636ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 142 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75742025-03-07T23:12:16.649ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75752025-03-07T23:12:16.649ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 143 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75762025-03-07T23:12:16.656ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75772025-03-07T23:12:16.656ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 143 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75782025-03-07T23:12:16.663ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75792025-03-07T23:12:16.663ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 144 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75802025-03-07T23:12:16.670ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75812025-03-07T23:12:16.670ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 144 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75822025-03-07T23:12:16.684ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75832025-03-07T23:12:16.685ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 145 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75842025-03-07T23:12:16.693ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75852025-03-07T23:12:16.694ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bea9208d-24bf-4d52-921a-f698f09b3f28"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}) node_id = 145 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75862025-03-07T23:12:16.710ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75872025-03-07T23:12:16.710ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 146 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75882025-03-07T23:12:16.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75892025-03-07T23:12:16.723ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 146 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75902025-03-07T23:12:16.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75912025-03-07T23:12:16.723ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 147 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75922025-03-07T23:12:16.740ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75932025-03-07T23:12:16.740ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 147 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75942025-03-07T23:12:16.740ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75952025-03-07T23:12:16.740ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 148 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75962025-03-07T23:12:16.745ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75972025-03-07T23:12:16.745ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 148 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
75982025-03-07T23:12:16.756ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
75992025-03-07T23:12:16.756ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 149 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76002025-03-07T23:12:16.779ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76012025-03-07T23:12:16.781ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b68e4b7-fa3b-4a69-81d6-64773ed266e3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}) node_id = 149 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76022025-03-07T23:12:16.807ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76032025-03-07T23:12:16.807ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 150 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76042025-03-07T23:12:16.832ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76052025-03-07T23:12:16.835ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 150 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76062025-03-07T23:12:16.893ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76072025-03-07T23:12:16.894ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 151 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76082025-03-07T23:12:16.903ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76092025-03-07T23:12:16.912ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 151 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76102025-03-07T23:12:16.929ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76112025-03-07T23:12:16.929ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 152 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76122025-03-07T23:12:16.950ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76132025-03-07T23:12:16.955ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 152 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76142025-03-07T23:12:16.962ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76152025-03-07T23:12:16.963ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 153 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76162025-03-07T23:12:16.968ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76172025-03-07T23:12:16.968ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("0ba256b7-fc39-46d6-93a0-bf510830a5f1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}) node_id = 153 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76182025-03-07T23:12:16.974ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76192025-03-07T23:12:16.975ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 154 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76202025-03-07T23:12:16.983ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76212025-03-07T23:12:16.983ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 154 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76222025-03-07T23:12:16.990ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76232025-03-07T23:12:16.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 155 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76242025-03-07T23:12:16.996ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76252025-03-07T23:12:16.998ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 155 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76262025-03-07T23:12:17.006ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76272025-03-07T23:12:17.006ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 156 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76282025-03-07T23:12:17.009ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76292025-03-07T23:12:17.010ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 156 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76302025-03-07T23:12:17.020ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76312025-03-07T23:12:17.020ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 157 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76322025-03-07T23:12:17.025ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76332025-03-07T23:12:17.026ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bfa0a669-7ebd-42dc-b51d-cb8ebf4ba705"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}) node_id = 157 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76342025-03-07T23:12:17.035ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76352025-03-07T23:12:17.035ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 158 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76362025-03-07T23:12:17.041ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76372025-03-07T23:12:17.042ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 158 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76382025-03-07T23:12:17.050ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76392025-03-07T23:12:17.051ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 159 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76402025-03-07T23:12:17.060ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76412025-03-07T23:12:17.061ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 159 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76422025-03-07T23:12:17.067ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76432025-03-07T23:12:17.068ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 160 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76442025-03-07T23:12:17.075ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76452025-03-07T23:12:17.075ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 160 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76462025-03-07T23:12:17.084ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76472025-03-07T23:12:17.087ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 161 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76482025-03-07T23:12:17.090ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76492025-03-07T23:12:17.090ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2c791e02-44e8-434a-a279-94277b330be7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}) node_id = 161 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76502025-03-07T23:12:17.098ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76512025-03-07T23:12:17.098ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 162 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76522025-03-07T23:12:17.108ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76532025-03-07T23:12:17.109ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 162 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76542025-03-07T23:12:17.119ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76552025-03-07T23:12:17.119ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 163 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76562025-03-07T23:12:17.125ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76572025-03-07T23:12:17.126ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 163 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76582025-03-07T23:12:17.132ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76592025-03-07T23:12:17.133ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 164 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76602025-03-07T23:12:17.137ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76612025-03-07T23:12:17.138ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 164 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76622025-03-07T23:12:17.143ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76632025-03-07T23:12:17.143ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 165 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76642025-03-07T23:12:17.151ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76652025-03-07T23:12:17.152ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 165 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76662025-03-07T23:12:17.160ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76672025-03-07T23:12:17.160ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 166 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76682025-03-07T23:12:17.186ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76692025-03-07T23:12:17.186ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 166 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76702025-03-07T23:12:17.195ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76712025-03-07T23:12:17.195ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 168 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76722025-03-07T23:12:17.205ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76732025-03-07T23:12:17.205ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 168 saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76742025-03-07T23:12:17.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
76752025-03-07T23:12:17.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
76762025-03-07T23:12:17.218ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
76772025-03-07T23:12:17.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
76782025-03-07T23:12:17.224ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76792025-03-07T23:12:17.224ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2
76802025-03-07T23:12:17.224ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
76812025-03-07T23:12:17.224ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
76822025-03-07T23:12:17.229ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
76832025-03-07T23:12:17.231ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
76842025-03-07T23:12:17.243ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
76852025-03-07T23:12:17.245ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2 saga_name = instance-create saga_result = SagaResult { saga_id: 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2, saga_log: SagaLog { saga_id: 1b7ce6ac-36fc-4588-af5e-79ba4a5ec7a2, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82888c06-1920-48a3-9e72-2ad13a44d89e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("eeea0910-f957-48a1-9c1e-17cb926e59ee"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f221b44c-f755-4825-822a-a7320a698728"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("231bcdf8-cb41-48a3-8b0f-3ff98951abb6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dd8547f1-a880-4a93-ab3f-693eb3724ead"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("9692d7ba-0beb-43a4-9b03-fabaa063ebe2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f653b89e-31b2-4c4d-9147-5e7d530dcf99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3e809831-3ae3-4407-bdb6-384c0a3b2662"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("e83b7f38-4362-485e-90c1-ceb1db1d2f49")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}), 40: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}), 41: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("a728f5fc-7f09-403e-9606-4793d53f4475"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e750d2aa-4db5-4c3f-a83d-8e8b9437eb47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("60a39e97-74e2-4feb-90a4-d5a233e2e501"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4fe89908-fa22-49bc-b419-7688e4e30c9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("d466894e-0aa0-497b-886b-5950ba1210c2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("90abcd5b-e3a7-4673-9f27-4c1d7ce918c5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("88ba6e0d-af6a-4e31-b2a3-6e93fca3118f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("779c4c01-fc1f-4ebb-bed0-f53b7b9238ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("474b7611-bae4-4dec-9a7d-59bb54caafd4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f9d26b85-0e99-4890-9e7c-3a4006db5c34"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dfd273ad-0c82-46a0-af51-c2d2b60ec7c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("1a950611-b245-4a0a-a7ae-55dc295384c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4e74203d-376a-4d55-9863-71155102e407"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("348f27fa-818d-4e13-8073-c297a7002128"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b4463b7-91e4-41a0-b310-3b51574da362"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f7a5aa1f-2366-4eb0-b146-27e22c9dd8ab"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("fc8f9d84-e1e1-442f-90aa-77cc9ede7a18"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82995ca6-ba7a-44f7-b042-03a99ca92c0d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ffcfbf8c-61ca-4ca1-baa1-d72c7a61e33d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e0717920-fb02-4508-bd3d-bb51ca1e90a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("935c669e-79b4-4b42-859a-8bcb722ead7c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("53c28d3e-38aa-4890-b2d5-d8dd078d71ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("aac524e3-ec3f-4b1f-b28c-ca44e1979e63"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3699c9b3-1a3a-4ab2-b423-754b5c1cb3bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("de17a577-0b05-4e03-a55b-f7c45f01655a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("6a1a03dc-bdcc-48bf-9469-be6dc6cacfc8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bea9208d-24bf-4d52-921a-f698f09b3f28"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b68e4b7-fa3b-4a69-81d6-64773ed266e3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("0ba256b7-fc39-46d6-93a0-bf510830a5f1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bfa0a669-7ebd-42dc-b51d-cb8ebf4ba705"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2c791e02-44e8-434a-a279-94277b330be7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Object {"description": Null, "first_port": Number(0), "id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:14.537875Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:14.675117Z")}, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ba2fe102-d4f1-46e8-9d3d-a82adb83960d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("a728f5fc-7f09-403e-9606-4793d53f4475"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f9d26b85-0e99-4890-9e7c-3a4006db5c34"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dfd273ad-0c82-46a0-af51-c2d2b60ec7c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("1a950611-b245-4a0a-a7ae-55dc295384c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4e74203d-376a-4d55-9863-71155102e407"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("348f27fa-818d-4e13-8073-c297a7002128"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b4463b7-91e4-41a0-b310-3b51574da362"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f7a5aa1f-2366-4eb0-b146-27e22c9dd8ab"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("fc8f9d84-e1e1-442f-90aa-77cc9ede7a18"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82995ca6-ba7a-44f7-b042-03a99ca92c0d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("ffcfbf8c-61ca-4ca1-baa1-d72c7a61e33d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e750d2aa-4db5-4c3f-a83d-8e8b9437eb47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("e0717920-fb02-4508-bd3d-bb51ca1e90a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("935c669e-79b4-4b42-859a-8bcb722ead7c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("53c28d3e-38aa-4890-b2d5-d8dd078d71ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("aac524e3-ec3f-4b1f-b28c-ca44e1979e63"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3699c9b3-1a3a-4ab2-b423-754b5c1cb3bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("de17a577-0b05-4e03-a55b-f7c45f01655a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("6a1a03dc-bdcc-48bf-9469-be6dc6cacfc8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bea9208d-24bf-4d52-921a-f698f09b3f28"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2b68e4b7-fa3b-4a69-81d6-64773ed266e3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("0ba256b7-fc39-46d6-93a0-bf510830a5f1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("60a39e97-74e2-4feb-90a4-d5a233e2e501"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("bfa0a669-7ebd-42dc-b51d-cb8ebf4ba705"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("2c791e02-44e8-434a-a279-94277b330be7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("4fe89908-fa22-49bc-b419-7688e4e30c9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("d466894e-0aa0-497b-886b-5950ba1210c2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("90abcd5b-e3a7-4673-9f27-4c1d7ce918c5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("88ba6e0d-af6a-4e31-b2a3-6e93fca3118f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("779c4c01-fc1f-4ebb-bed0-f53b7b9238ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("474b7611-bae4-4dec-9a7d-59bb54caafd4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("82888c06-1920-48a3-9e72-2ad13a44d89e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("eeea0910-f957-48a1-9c1e-17cb926e59ee"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f221b44c-f755-4825-822a-a7320a698728"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("231bcdf8-cb41-48a3-8b0f-3ff98951abb6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("dd8547f1-a880-4a93-ab3f-693eb3724ead"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("9692d7ba-0beb-43a4-9b03-fabaa063ebe2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("f653b89e-31b2-4c4d-9147-5e7d530dcf99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "new_id": String("3e809831-3ae3-4407-bdb6-384c0a3b2662"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("e83b7f38-4362-485e-90c1-ceb1db1d2f49"), "stopped_instance": Null} }) }
76862025-03-07T23:12:17.254ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
76872025-03-07T23:12:17.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
76882025-03-07T23:12:17.254ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
76892025-03-07T23:12:17.254ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
76902025-03-07T23:12:17.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
76912025-03-07T23:12:17.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
76922025-03-07T23:12:17.255ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
76932025-03-07T23:12:17.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
76942025-03-07T23:12:17.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
76952025-03-07T23:12:17.256ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } uri = /v1/instances?project=demo-project
76962025-03-07T23:12:17.256ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
76972025-03-07T23:12:17.256ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
76982025-03-07T23:12:17.256ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
76992025-03-07T23:12:17.256ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77002025-03-07T23:12:17.257ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
77012025-03-07T23:12:17.258ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77022025-03-07T23:12:17.258ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77032025-03-07T23:12:17.258ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77042025-03-07T23:12:17.260ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
77052025-03-07T23:12:17.260ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77062025-03-07T23:12:17.261ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77072025-03-07T23:12:17.262ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77082025-03-07T23:12:17.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
77092025-03-07T23:12:17.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) uri = /v1/instances?project=demo-project
77102025-03-07T23:12:17.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } uri = /v1/instances?project=demo-project
77112025-03-07T23:12:17.273ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
77122025-03-07T23:12:17.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77132025-03-07T23:12:17.273ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77142025-03-07T23:12:17.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77152025-03-07T23:12:17.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
77162025-03-07T23:12:17.280ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77172025-03-07T23:12:17.280ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77182025-03-07T23:12:17.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77192025-03-07T23:12:17.289ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
77202025-03-07T23:12:17.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77212025-03-07T23:12:17.290ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77222025-03-07T23:12:17.290ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77232025-03-07T23:12:17.293ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
77242025-03-07T23:12:17.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) uri = /v1/instances?project=demo-project
77252025-03-07T23:12:17.302ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
77262025-03-07T23:12:17.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77272025-03-07T23:12:17.303ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77282025-03-07T23:12:17.315ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start
77292025-03-07T23:12:17.315ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"demo-instance","identity":{"description":"","id":"3b345e54-8ce1-4328-8e77-7cf9ee33a84e","name":"demo-instance","time_created":"2025-03-07T23:12:13.329956Z","time_deleted":null,"time_modified":"2025-03-07T23:12:13.329956Z"},"memory":17179869184,"ncpus":1,"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-07T23:12:13.329956Z"},"updater_gen":1,"updater_id":null,"user_data":[]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10} saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77302025-03-07T23:12:17.315ZINFOtest_unauthorized (SecStore): creating saga saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start
77312025-03-07T23:12:17.319ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
77322025-03-07T23:12:17.321ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start
77332025-03-07T23:12:17.321ZINFOtest_unauthorized (SEC): saga start saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77342025-03-07T23:12:17.321ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77352025-03-07T23:12:17.321ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77362025-03-07T23:12:17.329ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77372025-03-07T23:12:17.329ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77382025-03-07T23:12:17.335ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77392025-03-07T23:12:17.336ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77402025-03-07T23:12:17.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77412025-03-07T23:12:17.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("9881e95e-e389-429d-a9c9-e8e7527a4e19")) node_id = 0 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77422025-03-07T23:12:17.347ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77432025-03-07T23:12:17.347ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77442025-03-07T23:12:17.357ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
77452025-03-07T23:12:17.357ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
77462025-03-07T23:12:17.358ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
77472025-03-07T23:12:17.491ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77482025-03-07T23:12:17.491ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")) node_id = 1 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77492025-03-07T23:12:17.500ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77502025-03-07T23:12:17.502ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77512025-03-07T23:12:17.508ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AllocPropolisIp
77522025-03-07T23:12:17.508ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AllocPropolisIp
77532025-03-07T23:12:17.509ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AllocPropolisIp
77542025-03-07T23:12:17.517ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77552025-03-07T23:12:17.518ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("::1:0")) node_id = 2 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77562025-03-07T23:12:17.525ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77572025-03-07T23:12:17.525ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77582025-03-07T23:12:17.533ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = CreateVmmRecord
77592025-03-07T23:12:17.538ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = CreateVmmRecord
77602025-03-07T23:12:17.538ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = CreateVmmRecord
77612025-03-07T23:12:17.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
77622025-03-07T23:12:17.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77632025-03-07T23:12:17.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0fce61a9-2a1a-4b58-91b2-22637716e347 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77642025-03-07T23:12:17.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0fce61a9-2a1a-4b58-91b2-22637716e347 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77652025-03-07T23:12:17.573ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0fce61a9-2a1a-4b58-91b2-22637716e347 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77662025-03-07T23:12:17.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0fce61a9-2a1a-4b58-91b2-22637716e347 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77672025-03-07T23:12:17.577ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3941 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0fce61a9-2a1a-4b58-91b2-22637716e347 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
77682025-03-07T23:12:17.578ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0fce61a9-2a1a-4b58-91b2-22637716e347", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:16 GMT"} })
77692025-03-07T23:12:17.578ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77702025-03-07T23:12:17.578ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b514f132-1786-47c9-8d62-badab0760084 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77712025-03-07T23:12:17.578ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b514f132-1786-47c9-8d62-badab0760084 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77722025-03-07T23:12:17.578ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b514f132-1786-47c9-8d62-badab0760084 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77732025-03-07T23:12:17.580ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b514f132-1786-47c9-8d62-badab0760084 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77742025-03-07T23:12:17.581ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3165 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b514f132-1786-47c9-8d62-badab0760084 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
77752025-03-07T23:12:17.584ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "b514f132-1786-47c9-8d62-badab0760084", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:16 GMT"} })
77762025-03-07T23:12:17.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77772025-03-07T23:12:17.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77782025-03-07T23:12:17.584ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
77792025-03-07T23:12:17.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77802025-03-07T23:12:17.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77812025-03-07T23:12:17.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77822025-03-07T23:12:17.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77832025-03-07T23:12:17.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77842025-03-07T23:12:17.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
77852025-03-07T23:12:17.630ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77862025-03-07T23:12:17.630ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:12:17.533519Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}) node_id = 3 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77872025-03-07T23:12:17.643ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
77882025-03-07T23:12:17.643ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
77892025-03-07T23:12:17.657ZINFOtest_unauthorized (SagaExecutor): moving instance to Starting state via saga instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start start_reason = AutoStart
77902025-03-07T23:12:17.657ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77912025-03-07T23:12:17.658ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77922025-03-07T23:12:17.659ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77932025-03-07T23:12:17.667ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77942025-03-07T23:12:17.668ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77952025-03-07T23:12:17.670ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77962025-03-07T23:12:17.675ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77972025-03-07T23:12:17.687ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77982025-03-07T23:12:17.690ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
77992025-03-07T23:12:17.690ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78002025-03-07T23:12:17.690ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78012025-03-07T23:12:17.692ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78022025-03-07T23:12:17.692ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78032025-03-07T23:12:17.692ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78042025-03-07T23:12:17.692ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78052025-03-07T23:12:17.692ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78062025-03-07T23:12:17.692ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78072025-03-07T23:12:17.692ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78082025-03-07T23:12:17.694ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78092025-03-07T23:12:17.694ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78102025-03-07T23:12:17.694ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78112025-03-07T23:12:17.694ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78122025-03-07T23:12:17.696ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78132025-03-07T23:12:17.706ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78142025-03-07T23:12:17.706ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78152025-03-07T23:12:17.706ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78162025-03-07T23:12:17.706ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78172025-03-07T23:12:17.706ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78182025-03-07T23:12:17.706ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78192025-03-07T23:12:17.711ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78202025-03-07T23:12:17.712ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78212025-03-07T23:12:17.712ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78222025-03-07T23:12:17.712ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78232025-03-07T23:12:17.715ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78242025-03-07T23:12:17.717ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78252025-03-07T23:12:17.717ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78262025-03-07T23:12:17.717ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78272025-03-07T23:12:17.718ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78282025-03-07T23:12:17.729ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78292025-03-07T23:12:17.729ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78302025-03-07T23:12:17.729ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78312025-03-07T23:12:17.729ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = MarkAsStarting
78322025-03-07T23:12:17.758ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
78332025-03-07T23:12:17.760ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 4 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
78342025-03-07T23:12:17.772ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
78352025-03-07T23:12:17.772ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
78362025-03-07T23:12:17.785ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance dpd configuration instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start start_reason = AutoStart
78372025-03-07T23:12:17.785ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
78382025-03-07T23:12:17.786ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
78392025-03-07T23:12:17.791ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
78402025-03-07T23:12:17.805ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
78412025-03-07T23:12:17.806ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
78422025-03-07T23:12:17.806ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
78432025-03-07T23:12:17.806ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
78442025-03-07T23:12:17.807ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
78452025-03-07T23:12:17.812ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
78462025-03-07T23:12:17.817ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
78472025-03-07T23:12:17.817ZINFOtest_unauthorized (nexus): looking up instance's primary network interface instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e
78482025-03-07T23:12:17.820ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78492025-03-07T23:12:17.820ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78502025-03-07T23:12:17.820ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78512025-03-07T23:12:17.832ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78522025-03-07T23:12:17.832ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78532025-03-07T23:12:17.833ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78542025-03-07T23:12:17.840ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78552025-03-07T23:12:17.840ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78562025-03-07T23:12:17.840ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78572025-03-07T23:12:17.840ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78582025-03-07T23:12:17.840ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78592025-03-07T23:12:17.840ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78602025-03-07T23:12:17.840ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78612025-03-07T23:12:17.840ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78622025-03-07T23:12:17.841ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78632025-03-07T23:12:17.843ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78642025-03-07T23:12:17.843ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78652025-03-07T23:12:17.843ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78662025-03-07T23:12:17.844ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78672025-03-07T23:12:17.845ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78682025-03-07T23:12:17.845ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78692025-03-07T23:12:17.845ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78702025-03-07T23:12:17.847ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78712025-03-07T23:12:17.854ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78722025-03-07T23:12:17.854ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78732025-03-07T23:12:17.855ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78742025-03-07T23:12:17.855ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78752025-03-07T23:12:17.855ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78762025-03-07T23:12:17.855ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78772025-03-07T23:12:17.858ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78782025-03-07T23:12:17.859ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78792025-03-07T23:12:17.859ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78802025-03-07T23:12:17.860ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78812025-03-07T23:12:17.862ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78822025-03-07T23:12:17.862ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78832025-03-07T23:12:17.862ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78842025-03-07T23:12:17.863ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78852025-03-07T23:12:17.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78862025-03-07T23:12:17.878ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78872025-03-07T23:12:17.878ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78882025-03-07T23:12:17.878ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78892025-03-07T23:12:17.879ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78902025-03-07T23:12:17.888ZINFOtest_unauthorized (nexus): looking up instance's external IPs instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e
78912025-03-07T23:12:17.888ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78922025-03-07T23:12:17.888ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78932025-03-07T23:12:17.889ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78942025-03-07T23:12:17.894ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78952025-03-07T23:12:17.894ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78962025-03-07T23:12:17.895ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78972025-03-07T23:12:17.931ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78982025-03-07T23:12:17.932ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
78992025-03-07T23:12:17.932ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = DpdEnsure
79002025-03-07T23:12:17.944ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
79012025-03-07T23:12:17.944ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
79022025-03-07T23:12:17.944ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
79032025-03-07T23:12:17.944ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
79042025-03-07T23:12:17.945ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
79052025-03-07T23:12:17.952ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
79062025-03-07T23:12:17.952ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
79072025-03-07T23:12:17.952ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
79082025-03-07T23:12:17.952ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
79092025-03-07T23:12:17.952ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
79102025-03-07T23:12:17.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
79112025-03-07T23:12:17.956ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
79122025-03-07T23:12:17.968ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
79132025-03-07T23:12:17.968ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
79142025-03-07T23:12:17.979ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 2 reason = Signaled
79152025-03-07T23:12:17.979ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79162025-03-07T23:12:17.979ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79172025-03-07T23:12:17.980ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79182025-03-07T23:12:17.980ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
79192025-03-07T23:12:17.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
79202025-03-07T23:12:17.993ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
79212025-03-07T23:12:17.994ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
79222025-03-07T23:12:18.004ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance is registered on sled instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
79232025-03-07T23:12:18.004ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79242025-03-07T23:12:18.004ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79252025-03-07T23:12:18.005ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79262025-03-07T23:12:18.009ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79272025-03-07T23:12:18.010ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79282025-03-07T23:12:18.010ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79292025-03-07T23:12:18.010ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79302025-03-07T23:12:18.010ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79312025-03-07T23:12:18.011ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79322025-03-07T23:12:18.016ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79332025-03-07T23:12:18.016ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79342025-03-07T23:12:18.017ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79352025-03-07T23:12:18.023ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79362025-03-07T23:12:18.024ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79372025-03-07T23:12:18.025ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79382025-03-07T23:12:18.025ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79392025-03-07T23:12:18.025ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79402025-03-07T23:12:18.033ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79412025-03-07T23:12:18.034ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79422025-03-07T23:12:18.035ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79432025-03-07T23:12:18.035ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79442025-03-07T23:12:18.038ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79452025-03-07T23:12:18.038ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79462025-03-07T23:12:18.038ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79472025-03-07T23:12:18.039ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79482025-03-07T23:12:18.042ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79492025-03-07T23:12:18.049ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79502025-03-07T23:12:18.050ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79512025-03-07T23:12:18.050ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79522025-03-07T23:12:18.050ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79532025-03-07T23:12:18.052ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79542025-03-07T23:12:18.052ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79552025-03-07T23:12:18.062ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79562025-03-07T23:12:18.063ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79572025-03-07T23:12:18.063ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79582025-03-07T23:12:18.063ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79592025-03-07T23:12:18.067ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79602025-03-07T23:12:18.069ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79612025-03-07T23:12:18.069ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79622025-03-07T23:12:18.069ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79632025-03-07T23:12:18.073ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79642025-03-07T23:12:18.086ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79652025-03-07T23:12:18.089ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79662025-03-07T23:12:18.089ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79672025-03-07T23:12:18.090ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79682025-03-07T23:12:18.090ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79692025-03-07T23:12:18.092ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79702025-03-07T23:12:18.120ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
79712025-03-07T23:12:18.125ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
79722025-03-07T23:12:18.126ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79732025-03-07T23:12:18.126ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79742025-03-07T23:12:18.130ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79752025-03-07T23:12:18.137ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
79762025-03-07T23:12:18.143ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
79772025-03-07T23:12:18.144ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
79782025-03-07T23:12:18.144ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
79792025-03-07T23:12:18.144ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79802025-03-07T23:12:18.144ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79812025-03-07T23:12:18.144ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79822025-03-07T23:12:18.146ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79832025-03-07T23:12:18.146ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79842025-03-07T23:12:18.146ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79852025-03-07T23:12:18.146ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79862025-03-07T23:12:18.147ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
79872025-03-07T23:12:18.152ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
79882025-03-07T23:12:18.153ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79892025-03-07T23:12:18.153ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79902025-03-07T23:12:18.153ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79912025-03-07T23:12:18.153ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79922025-03-07T23:12:18.153ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79932025-03-07T23:12:18.153ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79942025-03-07T23:12:18.154ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79952025-03-07T23:12:18.160ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79962025-03-07T23:12:18.170ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79972025-03-07T23:12:18.171ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79982025-03-07T23:12:18.171ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
79992025-03-07T23:12:18.171ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80002025-03-07T23:12:18.245ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:41065/v2p
80012025-03-07T23:12:18.246ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34808 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
80022025-03-07T23:12:18.246ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80032025-03-07T23:12:18.246ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80042025-03-07T23:12:18.246ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
80052025-03-07T23:12:18.247ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
80062025-03-07T23:12:18.247ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34808 req_id = a82b18d6-4db4-45fc-b325-eb54be4f3dff sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80072025-03-07T23:12:18.248ZINFOtest_unauthorized (dropshot): request completed latency_us = 199 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34808 req_id = a82b18d6-4db4-45fc-b325-eb54be4f3dff response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80082025-03-07T23:12:18.248ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:41065/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "a82b18d6-4db4-45fc-b325-eb54be4f3dff", "content-length": "2", "date": "Fri, 07 Mar 2025 23:12:17 GMT"} })
80092025-03-07T23:12:18.248ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
80102025-03-07T23:12:18.248ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
80112025-03-07T23:12:18.248ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(4187191) }] sled = sim-b6d65341
80122025-03-07T23:12:18.248ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = Some(Body) method = PUT uri = http://[::1]:41065/v2p
80132025-03-07T23:12:18.249ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34808 req_id = e8e8fe33-cfff-4bd4-9abe-b1992647c4c3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80142025-03-07T23:12:18.249ZINFOtest_unauthorized (dropshot): request completed latency_us = 276 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34808 req_id = e8e8fe33-cfff-4bd4-9abe-b1992647c4c3 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80152025-03-07T23:12:18.249ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:41065/v2p", status: 204, headers: {"x-request-id": "e8e8fe33-cfff-4bd4-9abe-b1992647c4c3", "date": "Fri, 07 Mar 2025 23:12:17 GMT"} })
80162025-03-07T23:12:18.250ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 271.530811ms iteration = 2 status = {}
80172025-03-07T23:12:18.255ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80182025-03-07T23:12:18.255ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80192025-03-07T23:12:18.259ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80202025-03-07T23:12:18.262ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80212025-03-07T23:12:18.262ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80222025-03-07T23:12:18.263ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
80232025-03-07T23:12:18.263ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
80242025-03-07T23:12:18.267ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80252025-03-07T23:12:18.267ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80262025-03-07T23:12:18.269ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80272025-03-07T23:12:18.269ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80282025-03-07T23:12:18.269ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
80292025-03-07T23:12:18.269ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80302025-03-07T23:12:18.274ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80312025-03-07T23:12:18.274ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80322025-03-07T23:12:18.274ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80332025-03-07T23:12:18.274ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80342025-03-07T23:12:18.277ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80352025-03-07T23:12:18.285ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80362025-03-07T23:12:18.285ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80372025-03-07T23:12:18.285ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80382025-03-07T23:12:18.286ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80392025-03-07T23:12:18.294ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80402025-03-07T23:12:18.295ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80412025-03-07T23:12:18.296ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80422025-03-07T23:12:18.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80432025-03-07T23:12:18.301ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80442025-03-07T23:12:18.301ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80452025-03-07T23:12:18.306ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80462025-03-07T23:12:18.306ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80472025-03-07T23:12:18.307ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80482025-03-07T23:12:18.310ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80492025-03-07T23:12:18.310ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80502025-03-07T23:12:18.311ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80512025-03-07T23:12:18.313ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80522025-03-07T23:12:18.313ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80532025-03-07T23:12:18.316ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80542025-03-07T23:12:18.318ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80552025-03-07T23:12:18.318ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80562025-03-07T23:12:18.318ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80572025-03-07T23:12:18.318ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80582025-03-07T23:12:18.319ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80592025-03-07T23:12:18.323ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80602025-03-07T23:12:18.323ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80612025-03-07T23:12:18.323ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80622025-03-07T23:12:18.325ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80632025-03-07T23:12:18.330ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80642025-03-07T23:12:18.332ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80652025-03-07T23:12:18.332ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80662025-03-07T23:12:18.332ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80672025-03-07T23:12:18.333ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80682025-03-07T23:12:18.341ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80692025-03-07T23:12:18.341ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80702025-03-07T23:12:18.341ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80712025-03-07T23:12:18.341ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80722025-03-07T23:12:18.341ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80732025-03-07T23:12:18.341ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80742025-03-07T23:12:18.348ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
80752025-03-07T23:12:18.348ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80762025-03-07T23:12:18.348ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80772025-03-07T23:12:18.349ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80782025-03-07T23:12:18.349ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80792025-03-07T23:12:18.353ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80802025-03-07T23:12:18.353ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80812025-03-07T23:12:18.353ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80822025-03-07T23:12:18.354ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80832025-03-07T23:12:18.357ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80842025-03-07T23:12:18.364ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80852025-03-07T23:12:18.364ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80862025-03-07T23:12:18.365ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80872025-03-07T23:12:18.365ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80882025-03-07T23:12:18.368ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80892025-03-07T23:12:18.368ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80902025-03-07T23:12:18.372ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80912025-03-07T23:12:18.380ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80922025-03-07T23:12:18.383ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80932025-03-07T23:12:18.383ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80942025-03-07T23:12:18.385ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80952025-03-07T23:12:18.386ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80962025-03-07T23:12:18.386ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80972025-03-07T23:12:18.390ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80982025-03-07T23:12:18.391ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
80992025-03-07T23:12:18.391ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81002025-03-07T23:12:18.391ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81012025-03-07T23:12:18.391ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81022025-03-07T23:12:18.395ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81032025-03-07T23:12:18.397ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81042025-03-07T23:12:18.397ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81052025-03-07T23:12:18.397ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81062025-03-07T23:12:18.400ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81072025-03-07T23:12:18.400ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81082025-03-07T23:12:18.400ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81092025-03-07T23:12:18.401ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81102025-03-07T23:12:18.419ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81112025-03-07T23:12:18.429ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81122025-03-07T23:12:18.429ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81132025-03-07T23:12:18.429ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81142025-03-07T23:12:18.429ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81152025-03-07T23:12:18.430ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81162025-03-07T23:12:18.430ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81172025-03-07T23:12:18.434ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81182025-03-07T23:12:18.434ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81192025-03-07T23:12:18.434ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81202025-03-07T23:12:18.435ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81212025-03-07T23:12:18.438ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81222025-03-07T23:12:18.438ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81232025-03-07T23:12:18.438ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81242025-03-07T23:12:18.438ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81252025-03-07T23:12:18.445ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81262025-03-07T23:12:18.456ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") } result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81272025-03-07T23:12:18.467ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81282025-03-07T23:12:18.468ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81292025-03-07T23:12:18.468ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81302025-03-07T23:12:18.473ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {Name("default"): [NetworkInterface { id: 82888c06-1920-48a3-9e72-2ad13a44d89e, kind: Instance { id: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(4187191), primary: true, slot: 0, transit_ips: [] }]}
81312025-03-07T23:12:18.475ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 82888c06-1920-48a3-9e72-2ad13a44d89e, kind: Instance { id: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(4187191), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: Some([Vpc(Vni(4187191))]), filter_ports: None, filter_protocols: None, priority: 65534, status: Enabled, targets: [NetworkInterface { id: 82888c06-1920-48a3-9e72-2ad13a44d89e, kind: Instance { id: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(4187191), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("22")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 82888c06-1920-48a3-9e72-2ad13a44d89e, kind: Instance { id: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(4187191), primary: true, slot: 0, transit_ips: [] }] }]
81322025-03-07T23:12:18.475ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81332025-03-07T23:12:18.475ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81342025-03-07T23:12:18.475ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81352025-03-07T23:12:18.521ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81362025-03-07T23:12:18.521ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81372025-03-07T23:12:18.522ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81382025-03-07T23:12:18.526ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
81392025-03-07T23:12:18.526ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
81402025-03-07T23:12:18.526ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81412025-03-07T23:12:18.526ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81422025-03-07T23:12:18.527ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81432025-03-07T23:12:18.530ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
81442025-03-07T23:12:18.537ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
81452025-03-07T23:12:18.575ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19
81462025-03-07T23:12:18.576ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34812 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
81472025-03-07T23:12:18.576ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34812 req_id = 493977cc-bda7-4803-a181-46f7465cb131 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19
81482025-03-07T23:12:18.576ZINFOtest_unauthorized (SledAgent): created id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 initial_state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }, migration_in: None, migration_out: None } kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
81492025-03-07T23:12:18.576ZINFOtest_unauthorized (dropshot): request completed latency_us = 1466 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34812 req_id = 493977cc-bda7-4803-a181-46f7465cb131 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19
81502025-03-07T23:12:18.576ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19", status: 200, headers: {"content-type": "application/json", "x-request-id": "493977cc-bda7-4803-a181-46f7465cb131", "content-length": "131", "date": "Fri, 07 Mar 2025 23:12:17 GMT"} })
81512025-03-07T23:12:18.576ZINFOtest_unauthorized (SagaExecutor): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }
81522025-03-07T23:12:18.576ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81532025-03-07T23:12:18.576ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81542025-03-07T23:12:18.577ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRegistered
81552025-03-07T23:12:18.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81562025-03-07T23:12:18.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81572025-03-07T23:12:18.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81582025-03-07T23:12:18.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81592025-03-07T23:12:18.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81602025-03-07T23:12:18.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81612025-03-07T23:12:18.601ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81622025-03-07T23:12:18.601ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:12:18.572620919Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}) node_id = 7 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81632025-03-07T23:12:18.610ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81642025-03-07T23:12:18.611ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81652025-03-07T23:12:18.623ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AddVirtualResources
81662025-03-07T23:12:18.624ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AddVirtualResources
81672025-03-07T23:12:18.625ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = AddVirtualResources
81682025-03-07T23:12:18.647ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81692025-03-07T23:12:18.647ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81702025-03-07T23:12:18.654ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81712025-03-07T23:12:18.654ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81722025-03-07T23:12:18.663ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance is running instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
81732025-03-07T23:12:18.663ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81742025-03-07T23:12:18.663ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81752025-03-07T23:12:18.664ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81762025-03-07T23:12:18.668ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
81772025-03-07T23:12:18.668ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
81782025-03-07T23:12:18.668ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81792025-03-07T23:12:18.668ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81802025-03-07T23:12:18.669ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81812025-03-07T23:12:18.673ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
81822025-03-07T23:12:18.677ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
81832025-03-07T23:12:18.714ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
81842025-03-07T23:12:18.715ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34814 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
81852025-03-07T23:12:18.716ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34814 req_id = cf3cac8b-1efb-43d7-af56-bac083826a43 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
81862025-03-07T23:12:18.716ZINFOtest_unauthorized (SledAgent): noop transition id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 target = Running
81872025-03-07T23:12:18.716ZINFOtest_unauthorized (dropshot): request completed latency_us = 381 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34814 req_id = cf3cac8b-1efb-43d7-af56-bac083826a43 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
81882025-03-07T23:12:18.717ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "cf3cac8b-1efb-43d7-af56-bac083826a43", "content-length": "151", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
81892025-03-07T23:12:18.717ZINFOtest_unauthorized (SagaExecutor): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRunning vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }
81902025-03-07T23:12:18.717ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRunning
81912025-03-07T23:12:18.717ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRunning
81922025-03-07T23:12:18.717ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_node = EnsureRunning
81932025-03-07T23:12:18.725ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81942025-03-07T23:12:18.725ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81952025-03-07T23:12:18.741ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81962025-03-07T23:12:18.743ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81972025-03-07T23:12:18.749ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
81982025-03-07T23:12:18.751ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
81992025-03-07T23:12:18.756ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
82002025-03-07T23:12:18.756ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a
82012025-03-07T23:12:18.772ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
82022025-03-07T23:12:18.775ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 37f2e81a-80a5-4053-bbc0-ec634360ac9a saga_name = instance-start saga_result = SagaResult { saga_id: 37f2e81a-80a5-4053-bbc0-ec634360ac9a, saga_log: SagaLog { saga_id: 37f2e81a-80a5-4053-bbc0-ec634360ac9a, unwinding: false, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N011 started, N011 succeeded], node_status: {0: Succeeded(String("9881e95e-e389-429d-a9c9-e8e7527a4e19")), 1: Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")), 2: Succeeded(String("::1:0")), 3: Succeeded(Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:12:17.533519Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}), 4: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:12:18.572620919Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"dpd_ensure": Null, "ensure_registered": Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:12:18.572620919Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}, "ensure_running": Null, "propolis_id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "propolis_ip": String("::1:0"), "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "started_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:12:13.329956Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:13.329956Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:13.329956Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "v2p_ensure": Null, "virtual_resources": Null, "vmm_record": Object {"id": String("9881e95e-e389-429d-a9c9-e8e7527a4e19"), "instance_id": String("3b345e54-8ce1-4328-8e77-7cf9ee33a84e"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:12:17.533519Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:12:17.533519Z"), "time_deleted": Null}} }) }
82032025-03-07T23:12:18.776ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } uri = /v1/instances?project=demo-project
82042025-03-07T23:12:18.776ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
82052025-03-07T23:12:18.776ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82062025-03-07T23:12:18.776ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82072025-03-07T23:12:18.776ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82082025-03-07T23:12:18.781ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
82092025-03-07T23:12:18.781ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82102025-03-07T23:12:18.781ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82112025-03-07T23:12:18.782ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82122025-03-07T23:12:18.796ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
82132025-03-07T23:12:18.796ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82142025-03-07T23:12:18.796ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82152025-03-07T23:12:18.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82162025-03-07T23:12:18.802ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
82172025-03-07T23:12:18.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) uri = /v1/instances?project=demo-project
82182025-03-07T23:12:18.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82192025-03-07T23:12:18.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82202025-03-07T23:12:18.812ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82212025-03-07T23:12:18.816ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82222025-03-07T23:12:18.816ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82232025-03-07T23:12:18.817ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82242025-03-07T23:12:18.817ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 4 reason = Signaled
82252025-03-07T23:12:18.818ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
82262025-03-07T23:12:18.818ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
82272025-03-07T23:12:18.818ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
82282025-03-07T23:12:18.818ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82292025-03-07T23:12:18.818ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82302025-03-07T23:12:18.818ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82312025-03-07T23:12:18.820ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
82322025-03-07T23:12:18.828ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
82332025-03-07T23:12:18.828ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
82342025-03-07T23:12:18.828ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
82352025-03-07T23:12:18.828ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82362025-03-07T23:12:18.828ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82372025-03-07T23:12:18.829ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82382025-03-07T23:12:18.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82392025-03-07T23:12:18.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82402025-03-07T23:12:18.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82412025-03-07T23:12:18.831ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
82422025-03-07T23:12:18.837ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
82432025-03-07T23:12:18.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82442025-03-07T23:12:18.837ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82452025-03-07T23:12:18.837ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82462025-03-07T23:12:18.838ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82472025-03-07T23:12:18.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82482025-03-07T23:12:18.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82492025-03-07T23:12:18.943ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
82502025-03-07T23:12:18.943ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
82512025-03-07T23:12:18.944ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34816 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
82522025-03-07T23:12:18.944ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34816 req_id = 9020e780-018d-4d8c-9210-ebd0afc481ef sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
82532025-03-07T23:12:18.945ZINFOtest_unauthorized (dropshot): request completed latency_us = 338 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34816 req_id = 9020e780-018d-4d8c-9210-ebd0afc481ef response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
82542025-03-07T23:12:18.945ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "9020e780-018d-4d8c-9210-ebd0afc481ef", "content-length": "152", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
82552025-03-07T23:12:18.945ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82562025-03-07T23:12:18.945ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82572025-03-07T23:12:18.947ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82582025-03-07T23:12:18.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } uri = /v1/instances?project=demo-project
82592025-03-07T23:12:18.947ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
82602025-03-07T23:12:18.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82612025-03-07T23:12:18.947ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82622025-03-07T23:12:18.948ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82632025-03-07T23:12:18.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
82642025-03-07T23:12:18.959ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82652025-03-07T23:12:18.959ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82662025-03-07T23:12:18.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82672025-03-07T23:12:18.960ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
82682025-03-07T23:12:18.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82692025-03-07T23:12:18.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82702025-03-07T23:12:18.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82712025-03-07T23:12:18.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
82722025-03-07T23:12:18.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) uri = /v1/instances?project=demo-project
82732025-03-07T23:12:18.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } uri = /v1/instances?project=demo-project
82742025-03-07T23:12:18.985ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
82752025-03-07T23:12:18.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82762025-03-07T23:12:18.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82772025-03-07T23:12:18.988ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82782025-03-07T23:12:18.992ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
82792025-03-07T23:12:18.993ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82802025-03-07T23:12:18.993ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82812025-03-07T23:12:18.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82822025-03-07T23:12:18.997ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
82832025-03-07T23:12:18.997ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82842025-03-07T23:12:18.998ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82852025-03-07T23:12:18.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82862025-03-07T23:12:19.003ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
82872025-03-07T23:12:19.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ById(3b345e54-8ce1-4328-8e77-7cf9ee33a84e) } result = Ok(()) uri = /v1/instances?project=demo-project
82882025-03-07T23:12:19.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database uri = /v1/instances?project=demo-project
82892025-03-07T23:12:19.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82902025-03-07T23:12:19.026ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82912025-03-07T23:12:19.027ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {82888c06-1920-48a3-9e72-2ad13a44d89e: {10.0.0.1: {8da10816-b560-4a3a-b871-ab8d72aaaf74}, 10.0.0.0: {8da10816-b560-4a3a-b871-ab8d72aaaf74}}} background_task = vpc_route_manager sled = sim-b6d65341
82922025-03-07T23:12:19.027ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
82932025-03-07T23:12:19.031ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34816 req_id = 295d4404-d9c3-4b67-8692-401a1d97378c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
82942025-03-07T23:12:19.032ZINFOtest_unauthorized (dropshot): request completed latency_us = 360 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34816 req_id = 295d4404-d9c3-4b67-8692-401a1d97378c response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
82952025-03-07T23:12:19.033ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 5956366 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 56f9cd27-0057-4792-ac5c-0ac3508ed01a response_code = 201 uri = /v1/instances?project=demo-project
82962025-03-07T23:12:19.034ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "295d4404-d9c3-4b67-8692-401a1d97378c", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
82972025-03-07T23:12:19.036ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82982025-03-07T23:12:19.042ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82992025-03-07T23:12:19.043ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83002025-03-07T23:12:19.043ZINFOtest_unauthorized (external client test context): client received response status = 201
83012025-03-07T23:12:19.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
83022025-03-07T23:12:19.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf uri = /v1/instances?project=demo-project
83032025-03-07T23:12:19.043ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf uri = /v1/instances?project=demo-project
83042025-03-07T23:12:19.043ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
83052025-03-07T23:12:19.043ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83062025-03-07T23:12:19.043ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83072025-03-07T23:12:19.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83082025-03-07T23:12:19.054ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83092025-03-07T23:12:19.054ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83102025-03-07T23:12:19.054ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83112025-03-07T23:12:19.057ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83122025-03-07T23:12:19.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83132025-03-07T23:12:19.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83142025-03-07T23:12:19.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
83152025-03-07T23:12:19.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83162025-03-07T23:12:19.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83172025-03-07T23:12:19.061ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83182025-03-07T23:12:19.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83192025-03-07T23:12:19.062ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83202025-03-07T23:12:19.062ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83212025-03-07T23:12:19.063ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83222025-03-07T23:12:19.066ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
83232025-03-07T23:12:19.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83242025-03-07T23:12:19.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83252025-03-07T23:12:19.068ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83262025-03-07T23:12:19.081ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83272025-03-07T23:12:19.081ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83282025-03-07T23:12:19.082ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83292025-03-07T23:12:19.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
83302025-03-07T23:12:19.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
83312025-03-07T23:12:19.089ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83322025-03-07T23:12:19.089ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83332025-03-07T23:12:19.089ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83342025-03-07T23:12:19.089ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83352025-03-07T23:12:19.089ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83362025-03-07T23:12:19.090ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83372025-03-07T23:12:19.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
83382025-03-07T23:12:19.100ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83392025-03-07T23:12:19.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83402025-03-07T23:12:19.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83412025-03-07T23:12:19.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83422025-03-07T23:12:19.100ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83432025-03-07T23:12:19.100ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83442025-03-07T23:12:19.104ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83452025-03-07T23:12:19.107ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
83462025-03-07T23:12:19.108ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83472025-03-07T23:12:19.108ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83482025-03-07T23:12:19.109ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83492025-03-07T23:12:19.110ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83502025-03-07T23:12:19.111ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83512025-03-07T23:12:19.112ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83522025-03-07T23:12:19.114ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
83532025-03-07T23:12:19.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
83542025-03-07T23:12:19.119ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf uri = /v1/instances?project=demo-project
83552025-03-07T23:12:19.120ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
83562025-03-07T23:12:19.120ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83572025-03-07T23:12:19.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83582025-03-07T23:12:19.131ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) }
83592025-03-07T23:12:19.131ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
83602025-03-07T23:12:19.132ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83612025-03-07T23:12:19.132ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83622025-03-07T23:12:19.136ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83632025-03-07T23:12:19.144ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
83642025-03-07T23:12:19.144ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83652025-03-07T23:12:19.144ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83662025-03-07T23:12:19.148ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83672025-03-07T23:12:19.148ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83682025-03-07T23:12:19.149ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83692025-03-07T23:12:19.149ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83702025-03-07T23:12:19.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
83712025-03-07T23:12:19.149ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
83722025-03-07T23:12:19.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
83732025-03-07T23:12:19.149ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83742025-03-07T23:12:19.149ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83752025-03-07T23:12:19.149ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
83762025-03-07T23:12:19.149ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83772025-03-07T23:12:19.149ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83782025-03-07T23:12:19.150ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83792025-03-07T23:12:19.160ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
83802025-03-07T23:12:19.172ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(())
83812025-03-07T23:12:19.172ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user background_task = vpc_route_manager
83822025-03-07T23:12:19.172ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) }
83832025-03-07T23:12:19.172ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
83842025-03-07T23:12:19.172ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83852025-03-07T23:12:19.172ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83862025-03-07T23:12:19.172ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83872025-03-07T23:12:19.174ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
83882025-03-07T23:12:19.174ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
83892025-03-07T23:12:19.174ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83902025-03-07T23:12:19.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83912025-03-07T23:12:19.178ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83922025-03-07T23:12:19.179ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83932025-03-07T23:12:19.179ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83942025-03-07T23:12:19.179ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83952025-03-07T23:12:19.180ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
83962025-03-07T23:12:19.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
83972025-03-07T23:12:19.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83982025-03-07T23:12:19.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83992025-03-07T23:12:19.191ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84002025-03-07T23:12:19.191ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84012025-03-07T23:12:19.195ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84022025-03-07T23:12:19.197ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84032025-03-07T23:12:19.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
84042025-03-07T23:12:19.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
84052025-03-07T23:12:19.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84062025-03-07T23:12:19.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84072025-03-07T23:12:19.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84082025-03-07T23:12:19.227ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
84092025-03-07T23:12:19.227ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
84102025-03-07T23:12:19.228ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
84112025-03-07T23:12:19.229ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
84122025-03-07T23:12:19.230ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
84132025-03-07T23:12:19.251ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(())
84142025-03-07T23:12:19.251ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84152025-03-07T23:12:19.251ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84162025-03-07T23:12:19.252ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84172025-03-07T23:12:19.260ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84182025-03-07T23:12:19.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84192025-03-07T23:12:19.263ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84202025-03-07T23:12:19.265ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
84212025-03-07T23:12:19.265ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
84222025-03-07T23:12:19.266ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84232025-03-07T23:12:19.268ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84242025-03-07T23:12:19.269ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84252025-03-07T23:12:19.276ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
84262025-03-07T23:12:19.276ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
84272025-03-07T23:12:19.276ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84282025-03-07T23:12:19.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84292025-03-07T23:12:19.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84302025-03-07T23:12:19.282ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84312025-03-07T23:12:19.284ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84322025-03-07T23:12:19.284ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84332025-03-07T23:12:19.287ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
84342025-03-07T23:12:19.288ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84352025-03-07T23:12:19.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84362025-03-07T23:12:19.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84372025-03-07T23:12:19.294ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
84382025-03-07T23:12:19.294ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
84392025-03-07T23:12:19.294ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84402025-03-07T23:12:19.294ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84412025-03-07T23:12:19.294ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84422025-03-07T23:12:19.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
84432025-03-07T23:12:19.299ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
84442025-03-07T23:12:19.300ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
84452025-03-07T23:12:19.301ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
84462025-03-07T23:12:19.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84472025-03-07T23:12:19.301ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84482025-03-07T23:12:19.301ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84492025-03-07T23:12:19.302ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84502025-03-07T23:12:19.303ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84512025-03-07T23:12:19.303ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84522025-03-07T23:12:19.303ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
84532025-03-07T23:12:19.303ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84542025-03-07T23:12:19.304ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84552025-03-07T23:12:19.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84562025-03-07T23:12:19.306ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ById(4f79228f-8563-45f6-b35f-b99826cfcc94) }
84572025-03-07T23:12:19.309ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
84582025-03-07T23:12:19.310ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84592025-03-07T23:12:19.310ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84602025-03-07T23:12:19.310ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84612025-03-07T23:12:19.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
84622025-03-07T23:12:19.314ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
84632025-03-07T23:12:19.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
84642025-03-07T23:12:19.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84652025-03-07T23:12:19.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84662025-03-07T23:12:19.318ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
84672025-03-07T23:12:19.319ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84682025-03-07T23:12:19.319ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84692025-03-07T23:12:19.319ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84702025-03-07T23:12:19.322ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
84712025-03-07T23:12:19.322ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84722025-03-07T23:12:19.323ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
84732025-03-07T23:12:19.323ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
84742025-03-07T23:12:19.325ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
84752025-03-07T23:12:19.326ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84762025-03-07T23:12:19.326ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84772025-03-07T23:12:19.326ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84782025-03-07T23:12:19.326ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84792025-03-07T23:12:19.327ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
84802025-03-07T23:12:19.329ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
84812025-03-07T23:12:19.329ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
84822025-03-07T23:12:19.329ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
84832025-03-07T23:12:19.330ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
84842025-03-07T23:12:19.330ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
84852025-03-07T23:12:19.343ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ById(4f79228f-8563-45f6-b35f-b99826cfcc94) } result = Ok(())
84862025-03-07T23:12:19.343ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
84872025-03-07T23:12:19.343ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84882025-03-07T23:12:19.343ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84892025-03-07T23:12:19.346ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84902025-03-07T23:12:19.347ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
84912025-03-07T23:12:19.351ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create
84922025-03-07T23:12:19.358ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"438b0157-26a1-4c8f-93a7-06021c6de471","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"207b9b37-24c5-4569-96e0-45f9b68e8780","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"7d7ae50e-e233-48fc-b4d3-2d3436115ea3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"d84afb9c-8cd6-42f5-aa90-6563a4b2b2d0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"882fb927-df75-4d42-b10c-71efd1b7c905","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"10350c21-ee77-43c8-ac53-b47e4cfd3548","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"ff681884-b841-40a9-bad2-353b2af20d54","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"9fa0c029-242e-4114-96bb-ad661e95eea1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"56a6c987-4c1c-4b66-af86-9b3304c2ba6b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"920d823e-6e25-4667-88d3-26ffa2ed4100","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"b1ee1ef1-8457-412e-b4f7-fbefea72e444","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"81817801-88c9-4d13-ab32-8d0e662fe0cb","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"161c5f5a-bffa-411f-90e2-c03bee50c8da","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"17a1e05b-96db-45cf-869b-5d594c6dd6b5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"589c77be-49f8-4a96-b796-34b3d446c87d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"16961a94-f45e-42de-b0c2-cf594df2aa9d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"5728f97d-6218-4f51-a616-760d796feed7","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"888ffee3-ba14-47d4-b2e5-2407d4233f83","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"bdea35dd-f04e-4a00-ae99-461d45039ca9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"08f42837-c0e0-470f-a043-5b350bc18e7f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"44e03546-0cff-44bd-92a8-39f98489545b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"62026d64-f595-4a2a-8b89-6b4fd2349d95","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"b9aff95e-3edd-49f1-92b8-d4ef638fe94c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"cb5114c1-8e11-40ad-9aba-4b70271a7eed","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"65c2913d-1b2c-4922-808f-a29b1ef1e575","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"d6cb58e8-45dc-4f8d-8182-c3b9f64b220a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"39fc03b2-7866-4eef-9ae6-03f3ee255cb5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"d98ec7d4-d295-49bf-ab18-676c5a86ce7f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"71d65ae9-64ee-4d30-a6de-1ec780ce30a3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"a5d7fbc5-14fb-4ad5-a247-c470f5e4b57d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"df44237a-180a-486b-a934-4706be7a95eb","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"61a16942-c253-478d-8b3d-f77bc708744d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"4e4826ad-ccf7-48f4-99e9-36d9674db870","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"1b4566c0-5564-448a-9fcf-46d9327cbe1d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"d9534762-c675-4c79-9c56-57fade27f5e6","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"6f0fa699-ee98-41d7-a9a1-7136986496b6","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"3a83a775-3be7-4e0b-b158-7fbee9884ea4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"bba1ca14-dceb-41a2-a57d-b90bc561735f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"e290151b-46c5-4018-9076-9878df75e61f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","new_id":"85cde240-c2a7-46fb-9fb8-9ec8e834a37d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167} saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
84932025-03-07T23:12:19.364ZINFOtest_unauthorized (SecStore): creating saga saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create
84942025-03-07T23:12:19.370ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84952025-03-07T23:12:19.370ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84962025-03-07T23:12:19.370ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84972025-03-07T23:12:19.379ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84982025-03-07T23:12:19.380ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84992025-03-07T23:12:19.380ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85002025-03-07T23:12:19.381ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85012025-03-07T23:12:19.382ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85022025-03-07T23:12:19.386ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85032025-03-07T23:12:19.386ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") }
85042025-03-07T23:12:19.386ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
85052025-03-07T23:12:19.386ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85062025-03-07T23:12:19.387ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85072025-03-07T23:12:19.387ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85082025-03-07T23:12:19.393ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
85092025-03-07T23:12:19.393ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85102025-03-07T23:12:19.393ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85112025-03-07T23:12:19.393ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85122025-03-07T23:12:19.394ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85132025-03-07T23:12:19.395ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85142025-03-07T23:12:19.395ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85152025-03-07T23:12:19.395ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85162025-03-07T23:12:19.399ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
85172025-03-07T23:12:19.411ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(())
85182025-03-07T23:12:19.411ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
85192025-03-07T23:12:19.411ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85202025-03-07T23:12:19.411ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85212025-03-07T23:12:19.412ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85222025-03-07T23:12:19.420ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85232025-03-07T23:12:19.420ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85242025-03-07T23:12:19.421ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85252025-03-07T23:12:19.427ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85262025-03-07T23:12:19.427ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85272025-03-07T23:12:19.427ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85282025-03-07T23:12:19.442ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85292025-03-07T23:12:19.442ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85302025-03-07T23:12:19.442ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85312025-03-07T23:12:19.445ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ByName("default") }
85322025-03-07T23:12:19.445ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
85332025-03-07T23:12:19.445ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85342025-03-07T23:12:19.446ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85352025-03-07T23:12:19.446ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85362025-03-07T23:12:19.450ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
85372025-03-07T23:12:19.451ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85382025-03-07T23:12:19.451ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85392025-03-07T23:12:19.451ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85402025-03-07T23:12:19.454ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85412025-03-07T23:12:19.455ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85422025-03-07T23:12:19.455ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85432025-03-07T23:12:19.455ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85442025-03-07T23:12:19.465ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
85452025-03-07T23:12:19.483ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ByName("default") } result = Ok(())
85462025-03-07T23:12:19.486ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user background_task = vpc_route_manager
85472025-03-07T23:12:19.486ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/vpc-routes
85482025-03-07T23:12:19.488ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34816 req_id = 8f4ead4e-c17a-4632-b0f3-68b6b3d44b69 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
85492025-03-07T23:12:19.490ZINFOtest_unauthorized (dropshot): request completed latency_us = 2054 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34816 req_id = 8f4ead4e-c17a-4632-b0f3-68b6b3d44b69 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
85502025-03-07T23:12:19.490ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 204, headers: {"x-request-id": "8f4ead4e-c17a-4632-b0f3-68b6b3d44b69", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
85512025-03-07T23:12:19.496ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 678.860403ms iteration = 4 status = {}
85522025-03-07T23:12:19.516ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create
85532025-03-07T23:12:19.516ZINFOtest_unauthorized (SEC): saga start saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85542025-03-07T23:12:19.516ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85552025-03-07T23:12:19.517ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 167 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
85562025-03-07T23:12:19.542ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85572025-03-07T23:12:19.542ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 167 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
85582025-03-07T23:12:19.549ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85592025-03-07T23:12:19.549ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
85602025-03-07T23:12:19.556ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85612025-03-07T23:12:19.556ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a")) node_id = 0 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
85622025-03-07T23:12:19.565ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85632025-03-07T23:12:19.565ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
85642025-03-07T23:12:19.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
85652025-03-07T23:12:19.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85662025-03-07T23:12:19.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 69d84fc1-2391-4e5e-98f0-3afbe8f785d2 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85672025-03-07T23:12:19.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 69d84fc1-2391-4e5e-98f0-3afbe8f785d2 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85682025-03-07T23:12:19.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 69d84fc1-2391-4e5e-98f0-3afbe8f785d2 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85692025-03-07T23:12:19.576ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 69d84fc1-2391-4e5e-98f0-3afbe8f785d2 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85702025-03-07T23:12:19.577ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85712025-03-07T23:12:19.578ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85722025-03-07T23:12:19.578ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85732025-03-07T23:12:19.579ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5760 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 69d84fc1-2391-4e5e-98f0-3afbe8f785d2 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
85742025-03-07T23:12:19.579ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "69d84fc1-2391-4e5e-98f0-3afbe8f785d2", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
85752025-03-07T23:12:19.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85762025-03-07T23:12:19.581ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85772025-03-07T23:12:19.581ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85782025-03-07T23:12:19.581ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85792025-03-07T23:12:19.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 50906eca-c5d6-45bd-8f87-7e81550f8508 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85802025-03-07T23:12:19.581ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 50906eca-c5d6-45bd-8f87-7e81550f8508 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85812025-03-07T23:12:19.582ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 50906eca-c5d6-45bd-8f87-7e81550f8508 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85822025-03-07T23:12:19.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 50906eca-c5d6-45bd-8f87-7e81550f8508 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85832025-03-07T23:12:19.584ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85842025-03-07T23:12:19.584ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85852025-03-07T23:12:19.584ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85862025-03-07T23:12:19.584ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85872025-03-07T23:12:19.585ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85882025-03-07T23:12:19.587ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4862 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 50906eca-c5d6-45bd-8f87-7e81550f8508 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
85892025-03-07T23:12:19.587ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "50906eca-c5d6-45bd-8f87-7e81550f8508", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:18 GMT"} })
85902025-03-07T23:12:19.587ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
85912025-03-07T23:12:19.587ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
85922025-03-07T23:12:19.587ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
85932025-03-07T23:12:19.589ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85942025-03-07T23:12:19.590ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85952025-03-07T23:12:19.590ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85962025-03-07T23:12:19.590ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
85972025-03-07T23:12:19.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
85982025-03-07T23:12:19.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
85992025-03-07T23:12:19.593ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
86002025-03-07T23:12:19.594ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
86012025-03-07T23:12:19.594ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
86022025-03-07T23:12:19.594ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
86032025-03-07T23:12:19.596ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86042025-03-07T23:12:19.596ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86052025-03-07T23:12:19.596ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86062025-03-07T23:12:19.596ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86072025-03-07T23:12:19.601ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86082025-03-07T23:12:19.658ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86092025-03-07T23:12:19.660ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86102025-03-07T23:12:19.662ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86112025-03-07T23:12:19.662ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86122025-03-07T23:12:19.662ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86132025-03-07T23:12:19.662ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86142025-03-07T23:12:19.664ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86152025-03-07T23:12:19.664ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86162025-03-07T23:12:19.664ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86172025-03-07T23:12:19.665ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86182025-03-07T23:12:19.667ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86192025-03-07T23:12:19.670ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86202025-03-07T23:12:19.670ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86212025-03-07T23:12:19.670ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86222025-03-07T23:12:19.671ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86232025-03-07T23:12:19.677ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86242025-03-07T23:12:19.678ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86252025-03-07T23:12:19.678ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86262025-03-07T23:12:19.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateInstanceRecord
86272025-03-07T23:12:19.698ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86282025-03-07T23:12:19.699ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:12:19.575193Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:19.575193Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:19.575193Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 1 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86292025-03-07T23:12:19.714ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86302025-03-07T23:12:19.715ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86312025-03-07T23:12:19.725ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86322025-03-07T23:12:19.725ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86332025-03-07T23:12:19.726ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86342025-03-07T23:12:19.727ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86352025-03-07T23:12:19.727ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86362025-03-07T23:12:19.730ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86372025-03-07T23:12:19.736ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86382025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86392025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86402025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86412025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86422025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86432025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86442025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86452025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86462025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86472025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86482025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86492025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86502025-03-07T23:12:19.743ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86512025-03-07T23:12:19.743ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86522025-03-07T23:12:19.744ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86532025-03-07T23:12:19.747ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86542025-03-07T23:12:19.747ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86552025-03-07T23:12:19.747ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86562025-03-07T23:12:19.747ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86572025-03-07T23:12:19.750ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86582025-03-07T23:12:19.752ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = AssociateSshKeys
86592025-03-07T23:12:19.752ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86602025-03-07T23:12:19.753ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86612025-03-07T23:12:19.761ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86622025-03-07T23:12:19.761ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86632025-03-07T23:12:19.783ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86642025-03-07T23:12:19.784ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("438b0157-26a1-4c8f-93a7-06021c6de471"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 3 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86652025-03-07T23:12:19.831ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86662025-03-07T23:12:19.832ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86672025-03-07T23:12:19.848ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86682025-03-07T23:12:19.848ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86692025-03-07T23:12:19.853ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
86702025-03-07T23:12:19.853ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
86712025-03-07T23:12:19.858ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86722025-03-07T23:12:19.859ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86732025-03-07T23:12:19.859ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86742025-03-07T23:12:19.867ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86752025-03-07T23:12:19.867ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86762025-03-07T23:12:19.867ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86772025-03-07T23:12:19.874ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86782025-03-07T23:12:19.875ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86792025-03-07T23:12:19.875ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86802025-03-07T23:12:19.876ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86812025-03-07T23:12:19.876ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86822025-03-07T23:12:19.877ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86832025-03-07T23:12:19.877ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86842025-03-07T23:12:19.877ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86852025-03-07T23:12:19.882ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86862025-03-07T23:12:19.883ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86872025-03-07T23:12:19.883ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86882025-03-07T23:12:19.883ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86892025-03-07T23:12:19.886ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86902025-03-07T23:12:19.886ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86912025-03-07T23:12:19.886ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86922025-03-07T23:12:19.887ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86932025-03-07T23:12:19.890ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86942025-03-07T23:12:19.898ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86952025-03-07T23:12:19.898ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86962025-03-07T23:12:19.898ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86972025-03-07T23:12:19.898ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86982025-03-07T23:12:19.909ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
86992025-03-07T23:12:19.910ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87002025-03-07T23:12:19.910ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87012025-03-07T23:12:19.915ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87022025-03-07T23:12:19.915ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87032025-03-07T23:12:19.918ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87042025-03-07T23:12:19.922ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87052025-03-07T23:12:19.923ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87062025-03-07T23:12:19.924ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87072025-03-07T23:12:19.927ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87082025-03-07T23:12:19.930ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87092025-03-07T23:12:19.930ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87102025-03-07T23:12:19.930ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87112025-03-07T23:12:19.931ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87122025-03-07T23:12:19.935ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87132025-03-07T23:12:19.935ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87142025-03-07T23:12:19.935ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87152025-03-07T23:12:19.937ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87162025-03-07T23:12:19.940ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87172025-03-07T23:12:19.940ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87182025-03-07T23:12:19.940ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87192025-03-07T23:12:19.941ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87202025-03-07T23:12:19.944ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87212025-03-07T23:12:19.952ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87222025-03-07T23:12:19.954ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87232025-03-07T23:12:19.955ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87242025-03-07T23:12:19.955ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87252025-03-07T23:12:19.955ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87262025-03-07T23:12:19.955ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87272025-03-07T23:12:19.988ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87282025-03-07T23:12:19.991ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87292025-03-07T23:12:19.991ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87302025-03-07T23:12:20.000ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87312025-03-07T23:12:20.015ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87322025-03-07T23:12:20.015ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87332025-03-07T23:12:20.015ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87342025-03-07T23:12:20.016ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87352025-03-07T23:12:20.018ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87362025-03-07T23:12:20.036ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87372025-03-07T23:12:20.037ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87382025-03-07T23:12:20.037ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87392025-03-07T23:12:20.037ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87402025-03-07T23:12:20.037ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87412025-03-07T23:12:20.038ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87422025-03-07T23:12:20.041ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87432025-03-07T23:12:20.041ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87442025-03-07T23:12:20.041ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87452025-03-07T23:12:20.042ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87462025-03-07T23:12:20.044ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87472025-03-07T23:12:20.045ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87482025-03-07T23:12:20.045ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87492025-03-07T23:12:20.045ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87502025-03-07T23:12:20.049ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87512025-03-07T23:12:20.061ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ByName("default") }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87522025-03-07T23:12:20.062ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87532025-03-07T23:12:20.062ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87542025-03-07T23:12:20.063ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87552025-03-07T23:12:20.107ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87562025-03-07T23:12:20.109ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87572025-03-07T23:12:20.109ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateNetworkInterface0
87582025-03-07T23:12:20.133ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87592025-03-07T23:12:20.133ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87602025-03-07T23:12:20.149ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87612025-03-07T23:12:20.149ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87622025-03-07T23:12:20.156ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87632025-03-07T23:12:20.157ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87642025-03-07T23:12:20.171ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87652025-03-07T23:12:20.171ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87662025-03-07T23:12:20.176ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87672025-03-07T23:12:20.176ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("207b9b37-24c5-4569-96e0-45f9b68e8780"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 7 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87682025-03-07T23:12:20.195ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87692025-03-07T23:12:20.199ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87702025-03-07T23:12:20.214ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87712025-03-07T23:12:20.215ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87722025-03-07T23:12:20.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87732025-03-07T23:12:20.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87742025-03-07T23:12:20.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
87752025-03-07T23:12:20.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
87762025-03-07T23:12:20.227ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87772025-03-07T23:12:20.229ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87782025-03-07T23:12:20.231ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
87792025-03-07T23:12:20.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
87802025-03-07T23:12:20.231ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87812025-03-07T23:12:20.231ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87822025-03-07T23:12:20.237ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
87832025-03-07T23:12:20.237ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87842025-03-07T23:12:20.244ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87852025-03-07T23:12:20.244ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87862025-03-07T23:12:20.250ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87872025-03-07T23:12:20.250ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87882025-03-07T23:12:20.256ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87892025-03-07T23:12:20.256ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87902025-03-07T23:12:20.264ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87912025-03-07T23:12:20.264ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("7d7ae50e-e233-48fc-b4d3-2d3436115ea3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 11 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87922025-03-07T23:12:20.272ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87932025-03-07T23:12:20.272ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87942025-03-07T23:12:20.277ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87952025-03-07T23:12:20.277ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87962025-03-07T23:12:20.283ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87972025-03-07T23:12:20.283ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
87982025-03-07T23:12:20.291ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
87992025-03-07T23:12:20.291ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88002025-03-07T23:12:20.307ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88012025-03-07T23:12:20.307ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88022025-03-07T23:12:20.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
88032025-03-07T23:12:20.325ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88042025-03-07T23:12:20.325ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88052025-03-07T23:12:20.339ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88062025-03-07T23:12:20.339ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88072025-03-07T23:12:20.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88082025-03-07T23:12:20.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d84afb9c-8cd6-42f5-aa90-6563a4b2b2d0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 15 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88092025-03-07T23:12:20.352ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88102025-03-07T23:12:20.353ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88112025-03-07T23:12:20.361ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88122025-03-07T23:12:20.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88132025-03-07T23:12:20.369ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88142025-03-07T23:12:20.370ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88152025-03-07T23:12:20.378ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88162025-03-07T23:12:20.378ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88172025-03-07T23:12:20.392ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88182025-03-07T23:12:20.392ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88192025-03-07T23:12:20.398ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88202025-03-07T23:12:20.398ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88212025-03-07T23:12:20.404ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88222025-03-07T23:12:20.404ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88232025-03-07T23:12:20.412ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88242025-03-07T23:12:20.412ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("882fb927-df75-4d42-b10c-71efd1b7c905"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 19 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88252025-03-07T23:12:20.421ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88262025-03-07T23:12:20.421ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88272025-03-07T23:12:20.428ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88282025-03-07T23:12:20.428ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88292025-03-07T23:12:20.434ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88302025-03-07T23:12:20.434ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88312025-03-07T23:12:20.440ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88322025-03-07T23:12:20.440ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88332025-03-07T23:12:20.448ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88342025-03-07T23:12:20.448ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88352025-03-07T23:12:20.453ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88362025-03-07T23:12:20.454ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88372025-03-07T23:12:20.460ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88382025-03-07T23:12:20.460ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88392025-03-07T23:12:20.465ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88402025-03-07T23:12:20.465ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("10350c21-ee77-43c8-ac53-b47e4cfd3548"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 23 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88412025-03-07T23:12:20.473ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88422025-03-07T23:12:20.473ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 24 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88432025-03-07T23:12:20.477ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88442025-03-07T23:12:20.478ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 24 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88452025-03-07T23:12:20.490ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88462025-03-07T23:12:20.490ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 25 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88472025-03-07T23:12:20.497ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88482025-03-07T23:12:20.497ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 25 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88492025-03-07T23:12:20.503ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88502025-03-07T23:12:20.503ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 26 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88512025-03-07T23:12:20.519ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88522025-03-07T23:12:20.519ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 26 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88532025-03-07T23:12:20.525ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88542025-03-07T23:12:20.526ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 27 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88552025-03-07T23:12:20.539ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88562025-03-07T23:12:20.541ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("ff681884-b841-40a9-bad2-353b2af20d54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 27 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88572025-03-07T23:12:20.549ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88582025-03-07T23:12:20.549ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 28 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88592025-03-07T23:12:20.556ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88602025-03-07T23:12:20.556ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 28 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88612025-03-07T23:12:20.563ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88622025-03-07T23:12:20.563ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 29 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88632025-03-07T23:12:20.571ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88642025-03-07T23:12:20.574ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 29 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88652025-03-07T23:12:20.577ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88662025-03-07T23:12:20.578ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 30 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88672025-03-07T23:12:20.582ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88682025-03-07T23:12:20.582ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 30 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88692025-03-07T23:12:20.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88702025-03-07T23:12:20.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88712025-03-07T23:12:20.589ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88722025-03-07T23:12:20.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88732025-03-07T23:12:20.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88742025-03-07T23:12:20.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88752025-03-07T23:12:20.591ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88762025-03-07T23:12:20.591ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 31 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88772025-03-07T23:12:20.596ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88782025-03-07T23:12:20.598ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("9fa0c029-242e-4114-96bb-ad661e95eea1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 31 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88792025-03-07T23:12:20.613ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88802025-03-07T23:12:20.613ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 32 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88812025-03-07T23:12:20.622ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88822025-03-07T23:12:20.623ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 32 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88832025-03-07T23:12:20.630ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88842025-03-07T23:12:20.630ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 33 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88852025-03-07T23:12:20.637ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88862025-03-07T23:12:20.637ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 33 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88872025-03-07T23:12:20.643ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88882025-03-07T23:12:20.643ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 34 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88892025-03-07T23:12:20.649ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88902025-03-07T23:12:20.649ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 34 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88912025-03-07T23:12:20.655ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88922025-03-07T23:12:20.655ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 35 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88932025-03-07T23:12:20.662ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88942025-03-07T23:12:20.662ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("03b27c13-f953-40ac-b57a-073cd8cedb78")) node_id = 35 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88952025-03-07T23:12:20.669ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
88962025-03-07T23:12:20.669ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 36 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
88972025-03-07T23:12:20.677ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
88982025-03-07T23:12:20.677ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
88992025-03-07T23:12:20.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
89002025-03-07T23:12:20.682ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
89012025-03-07T23:12:20.682ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
89022025-03-07T23:12:20.683ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateSnatIp
89032025-03-07T23:12:20.728ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89042025-03-07T23:12:20.728ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 36 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89052025-03-07T23:12:20.737ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89062025-03-07T23:12:20.737ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 37 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89072025-03-07T23:12:20.744ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89082025-03-07T23:12:20.744ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 37 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89092025-03-07T23:12:20.752ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89102025-03-07T23:12:20.752ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 38 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89112025-03-07T23:12:20.765ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89122025-03-07T23:12:20.765ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 38 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89132025-03-07T23:12:20.774ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89142025-03-07T23:12:20.774ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 39 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89152025-03-07T23:12:20.787ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89162025-03-07T23:12:20.787ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89172025-03-07T23:12:20.788ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89182025-03-07T23:12:20.790ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89192025-03-07T23:12:20.790ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89202025-03-07T23:12:20.790ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89212025-03-07T23:12:20.790ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89222025-03-07T23:12:20.791ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89232025-03-07T23:12:20.794ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89242025-03-07T23:12:20.798ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89252025-03-07T23:12:20.798ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89262025-03-07T23:12:20.798ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89272025-03-07T23:12:20.799ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89282025-03-07T23:12:20.801ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89292025-03-07T23:12:20.801ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89302025-03-07T23:12:20.801ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89312025-03-07T23:12:20.802ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89322025-03-07T23:12:20.802ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89332025-03-07T23:12:20.808ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89342025-03-07T23:12:20.811ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89352025-03-07T23:12:20.812ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89362025-03-07T23:12:20.812ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89372025-03-07T23:12:20.812ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89382025-03-07T23:12:20.858ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89392025-03-07T23:12:20.860ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89402025-03-07T23:12:20.860ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89412025-03-07T23:12:20.887ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89422025-03-07T23:12:20.887ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89432025-03-07T23:12:20.896ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89442025-03-07T23:12:20.903ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89452025-03-07T23:12:20.903ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89462025-03-07T23:12:20.904ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_node = CreateExternalIp0
89472025-03-07T23:12:20.915ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89482025-03-07T23:12:20.915ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}) node_id = 39 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89492025-03-07T23:12:20.923ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89502025-03-07T23:12:20.923ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 40 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89512025-03-07T23:12:20.929ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89522025-03-07T23:12:20.930ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}) node_id = 40 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89532025-03-07T23:12:20.939ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89542025-03-07T23:12:20.940ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 41 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89552025-03-07T23:12:20.946ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89562025-03-07T23:12:20.946ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("920d823e-6e25-4667-88d3-26ffa2ed4100"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 41 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89572025-03-07T23:12:20.952ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89582025-03-07T23:12:20.952ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 42 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89592025-03-07T23:12:20.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89602025-03-07T23:12:20.960ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 42 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89612025-03-07T23:12:20.968ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89622025-03-07T23:12:20.968ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 43 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89632025-03-07T23:12:20.976ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89642025-03-07T23:12:20.977ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 43 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89652025-03-07T23:12:20.983ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89662025-03-07T23:12:20.983ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 44 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89672025-03-07T23:12:20.997ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89682025-03-07T23:12:20.997ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 44 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89692025-03-07T23:12:21.008ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89702025-03-07T23:12:21.008ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 45 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89712025-03-07T23:12:21.013ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89722025-03-07T23:12:21.014ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b1ee1ef1-8457-412e-b4f7-fbefea72e444"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 45 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89732025-03-07T23:12:21.022ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89742025-03-07T23:12:21.022ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 46 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89752025-03-07T23:12:21.031ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89762025-03-07T23:12:21.031ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 46 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89772025-03-07T23:12:21.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89782025-03-07T23:12:21.038ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 47 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89792025-03-07T23:12:21.046ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89802025-03-07T23:12:21.046ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 47 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89812025-03-07T23:12:21.052ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89822025-03-07T23:12:21.053ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 48 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89832025-03-07T23:12:21.061ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89842025-03-07T23:12:21.061ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 48 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89852025-03-07T23:12:21.076ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89862025-03-07T23:12:21.076ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 49 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89872025-03-07T23:12:21.085ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89882025-03-07T23:12:21.085ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("81817801-88c9-4d13-ab32-8d0e662fe0cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 49 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89892025-03-07T23:12:21.092ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89902025-03-07T23:12:21.093ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 50 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89912025-03-07T23:12:21.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89922025-03-07T23:12:21.097ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 50 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89932025-03-07T23:12:21.103ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89942025-03-07T23:12:21.103ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 51 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89952025-03-07T23:12:21.114ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89962025-03-07T23:12:21.115ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 51 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89972025-03-07T23:12:21.121ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
89982025-03-07T23:12:21.121ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 52 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
89992025-03-07T23:12:21.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90002025-03-07T23:12:21.132ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 52 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90012025-03-07T23:12:21.137ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90022025-03-07T23:12:21.137ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 53 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90032025-03-07T23:12:21.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90042025-03-07T23:12:21.145ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("161c5f5a-bffa-411f-90e2-c03bee50c8da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 53 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90052025-03-07T23:12:21.153ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90062025-03-07T23:12:21.154ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 54 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90072025-03-07T23:12:21.162ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90082025-03-07T23:12:21.162ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 54 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90092025-03-07T23:12:21.171ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90102025-03-07T23:12:21.172ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 55 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90112025-03-07T23:12:21.180ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90122025-03-07T23:12:21.180ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 55 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90132025-03-07T23:12:21.186ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90142025-03-07T23:12:21.187ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 56 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90152025-03-07T23:12:21.193ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90162025-03-07T23:12:21.193ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 56 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90172025-03-07T23:12:21.201ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90182025-03-07T23:12:21.201ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 57 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90192025-03-07T23:12:21.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
90202025-03-07T23:12:21.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
90212025-03-07T23:12:21.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
90222025-03-07T23:12:21.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
90232025-03-07T23:12:21.223ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
90242025-03-07T23:12:21.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
90252025-03-07T23:12:21.223ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90262025-03-07T23:12:21.223ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("17a1e05b-96db-45cf-869b-5d594c6dd6b5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 57 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90272025-03-07T23:12:21.229ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
90282025-03-07T23:12:21.230ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
90292025-03-07T23:12:21.233ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90302025-03-07T23:12:21.233ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 58 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90312025-03-07T23:12:21.241ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90322025-03-07T23:12:21.241ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 58 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90332025-03-07T23:12:21.246ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90342025-03-07T23:12:21.246ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 59 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90352025-03-07T23:12:21.255ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90362025-03-07T23:12:21.255ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 59 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90372025-03-07T23:12:21.265ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90382025-03-07T23:12:21.267ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 60 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90392025-03-07T23:12:21.271ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90402025-03-07T23:12:21.271ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 60 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90412025-03-07T23:12:21.279ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90422025-03-07T23:12:21.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 61 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90432025-03-07T23:12:21.295ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90442025-03-07T23:12:21.296ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("589c77be-49f8-4a96-b796-34b3d446c87d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 61 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90452025-03-07T23:12:21.304ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90462025-03-07T23:12:21.304ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 62 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90472025-03-07T23:12:21.319ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
90482025-03-07T23:12:21.327ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90492025-03-07T23:12:21.328ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 62 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90502025-03-07T23:12:21.334ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90512025-03-07T23:12:21.334ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 63 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90522025-03-07T23:12:21.345ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90532025-03-07T23:12:21.345ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 63 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90542025-03-07T23:12:21.352ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90552025-03-07T23:12:21.353ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 64 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90562025-03-07T23:12:21.358ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90572025-03-07T23:12:21.359ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 64 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90582025-03-07T23:12:21.366ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90592025-03-07T23:12:21.366ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 65 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90602025-03-07T23:12:21.378ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90612025-03-07T23:12:21.379ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("16961a94-f45e-42de-b0c2-cf594df2aa9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 65 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90622025-03-07T23:12:21.387ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90632025-03-07T23:12:21.388ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 66 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90642025-03-07T23:12:21.408ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90652025-03-07T23:12:21.408ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 66 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90662025-03-07T23:12:21.417ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90672025-03-07T23:12:21.417ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 67 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90682025-03-07T23:12:21.423ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90692025-03-07T23:12:21.423ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 67 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90702025-03-07T23:12:21.429ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90712025-03-07T23:12:21.429ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 68 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90722025-03-07T23:12:21.435ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90732025-03-07T23:12:21.435ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 68 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90742025-03-07T23:12:21.442ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90752025-03-07T23:12:21.442ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 69 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90762025-03-07T23:12:21.447ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90772025-03-07T23:12:21.448ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("5728f97d-6218-4f51-a616-760d796feed7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}) node_id = 69 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90782025-03-07T23:12:21.454ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90792025-03-07T23:12:21.454ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 70 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90802025-03-07T23:12:21.461ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90812025-03-07T23:12:21.461ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 70 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90822025-03-07T23:12:21.467ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90832025-03-07T23:12:21.468ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 71 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90842025-03-07T23:12:21.478ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90852025-03-07T23:12:21.478ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 71 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90862025-03-07T23:12:21.487ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90872025-03-07T23:12:21.487ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 72 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90882025-03-07T23:12:21.495ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90892025-03-07T23:12:21.495ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 72 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90902025-03-07T23:12:21.501ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90912025-03-07T23:12:21.505ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 73 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90922025-03-07T23:12:21.510ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90932025-03-07T23:12:21.510ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("888ffee3-ba14-47d4-b2e5-2407d4233f83"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}) node_id = 73 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90942025-03-07T23:12:21.517ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90952025-03-07T23:12:21.517ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 74 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90962025-03-07T23:12:21.538ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90972025-03-07T23:12:21.538ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 74 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
90982025-03-07T23:12:21.544ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
90992025-03-07T23:12:21.544ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 75 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91002025-03-07T23:12:21.551ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91012025-03-07T23:12:21.551ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 75 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91022025-03-07T23:12:21.556ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91032025-03-07T23:12:21.556ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 76 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91042025-03-07T23:12:21.568ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91052025-03-07T23:12:21.568ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 76 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91062025-03-07T23:12:21.574ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
91072025-03-07T23:12:21.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91082025-03-07T23:12:21.576ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b11120b4-5483-464b-a06f-86406dfb5ebd uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91092025-03-07T23:12:21.577ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b11120b4-5483-464b-a06f-86406dfb5ebd resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91102025-03-07T23:12:21.577ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b11120b4-5483-464b-a06f-86406dfb5ebd roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91112025-03-07T23:12:21.578ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b11120b4-5483-464b-a06f-86406dfb5ebd resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91122025-03-07T23:12:21.578ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5055 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = b11120b4-5483-464b-a06f-86406dfb5ebd response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91132025-03-07T23:12:21.578ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b11120b4-5483-464b-a06f-86406dfb5ebd", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:21 GMT"} })
91142025-03-07T23:12:21.578ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91152025-03-07T23:12:21.579ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91162025-03-07T23:12:21.580ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 77 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91172025-03-07T23:12:21.580ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 586768e3-8c20-47c3-8f5e-4d7ff698f3ca uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91182025-03-07T23:12:21.580ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 586768e3-8c20-47c3-8f5e-4d7ff698f3ca resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91192025-03-07T23:12:21.580ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 586768e3-8c20-47c3-8f5e-4d7ff698f3ca roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91202025-03-07T23:12:21.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 586768e3-8c20-47c3-8f5e-4d7ff698f3ca resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91212025-03-07T23:12:21.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91222025-03-07T23:12:21.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91232025-03-07T23:12:21.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91242025-03-07T23:12:21.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91252025-03-07T23:12:21.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91262025-03-07T23:12:21.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91272025-03-07T23:12:21.591ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11344 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 586768e3-8c20-47c3-8f5e-4d7ff698f3ca response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
91282025-03-07T23:12:21.591ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "586768e3-8c20-47c3-8f5e-4d7ff698f3ca", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:21 GMT"} })
91292025-03-07T23:12:21.591ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91302025-03-07T23:12:21.591ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91312025-03-07T23:12:21.591ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
91322025-03-07T23:12:21.592ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91332025-03-07T23:12:21.596ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bdea35dd-f04e-4a00-ae99-461d45039ca9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}) node_id = 77 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91342025-03-07T23:12:21.605ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91352025-03-07T23:12:21.606ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 78 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91362025-03-07T23:12:21.610ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91372025-03-07T23:12:21.610ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 78 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91382025-03-07T23:12:21.616ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91392025-03-07T23:12:21.616ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 79 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91402025-03-07T23:12:21.624ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91412025-03-07T23:12:21.624ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 79 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91422025-03-07T23:12:21.633ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91432025-03-07T23:12:21.633ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 80 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91442025-03-07T23:12:21.646ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91452025-03-07T23:12:21.647ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 80 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91462025-03-07T23:12:21.669ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91472025-03-07T23:12:21.670ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 81 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91482025-03-07T23:12:21.673ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91492025-03-07T23:12:21.674ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("08f42837-c0e0-470f-a043-5b350bc18e7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}) node_id = 81 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91502025-03-07T23:12:21.681ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91512025-03-07T23:12:21.681ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 82 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91522025-03-07T23:12:21.690ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91532025-03-07T23:12:21.691ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 82 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91542025-03-07T23:12:21.698ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91552025-03-07T23:12:21.699ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 83 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91562025-03-07T23:12:21.703ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91572025-03-07T23:12:21.703ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 83 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91582025-03-07T23:12:21.713ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91592025-03-07T23:12:21.713ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 84 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91602025-03-07T23:12:21.719ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91612025-03-07T23:12:21.719ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 84 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91622025-03-07T23:12:21.725ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91632025-03-07T23:12:21.726ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 85 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91642025-03-07T23:12:21.734ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91652025-03-07T23:12:21.735ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("44e03546-0cff-44bd-92a8-39f98489545b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}) node_id = 85 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91662025-03-07T23:12:21.741ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91672025-03-07T23:12:21.742ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 86 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91682025-03-07T23:12:21.750ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91692025-03-07T23:12:21.750ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 86 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91702025-03-07T23:12:21.760ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91712025-03-07T23:12:21.761ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 87 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91722025-03-07T23:12:21.779ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91732025-03-07T23:12:21.779ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 87 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91742025-03-07T23:12:21.793ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91752025-03-07T23:12:21.794ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 88 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91762025-03-07T23:12:21.802ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91772025-03-07T23:12:21.802ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 88 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91782025-03-07T23:12:21.831ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91792025-03-07T23:12:21.831ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 89 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91802025-03-07T23:12:21.836ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91812025-03-07T23:12:21.837ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("62026d64-f595-4a2a-8b89-6b4fd2349d95"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}) node_id = 89 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91822025-03-07T23:12:21.845ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91832025-03-07T23:12:21.845ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 90 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91842025-03-07T23:12:21.851ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91852025-03-07T23:12:21.851ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 90 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91862025-03-07T23:12:21.857ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91872025-03-07T23:12:21.857ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 91 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91882025-03-07T23:12:21.866ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91892025-03-07T23:12:21.866ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 91 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91902025-03-07T23:12:21.877ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91912025-03-07T23:12:21.879ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 92 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91922025-03-07T23:12:21.886ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91932025-03-07T23:12:21.886ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 92 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91942025-03-07T23:12:21.892ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91952025-03-07T23:12:21.893ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 93 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91962025-03-07T23:12:21.898ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91972025-03-07T23:12:21.898ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b9aff95e-3edd-49f1-92b8-d4ef638fe94c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}) node_id = 93 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
91982025-03-07T23:12:21.907ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
91992025-03-07T23:12:21.908ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 94 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92002025-03-07T23:12:21.919ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92012025-03-07T23:12:21.919ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 94 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92022025-03-07T23:12:21.934ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92032025-03-07T23:12:21.934ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 95 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92042025-03-07T23:12:21.934ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92052025-03-07T23:12:21.934ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 95 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92062025-03-07T23:12:21.938ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92072025-03-07T23:12:21.938ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 96 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92082025-03-07T23:12:21.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92092025-03-07T23:12:21.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 96 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92102025-03-07T23:12:21.952ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92112025-03-07T23:12:21.953ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 97 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92122025-03-07T23:12:21.964ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92132025-03-07T23:12:21.966ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("cb5114c1-8e11-40ad-9aba-4b70271a7eed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}) node_id = 97 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92142025-03-07T23:12:21.974ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92152025-03-07T23:12:21.974ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 98 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92162025-03-07T23:12:21.979ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92172025-03-07T23:12:21.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 98 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92182025-03-07T23:12:21.985ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92192025-03-07T23:12:21.985ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 99 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92202025-03-07T23:12:21.991ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92212025-03-07T23:12:21.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 99 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92222025-03-07T23:12:21.997ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92232025-03-07T23:12:21.997ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 100 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92242025-03-07T23:12:22.002ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92252025-03-07T23:12:22.003ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 100 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92262025-03-07T23:12:22.008ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92272025-03-07T23:12:22.008ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 101 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92282025-03-07T23:12:22.014ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92292025-03-07T23:12:22.014ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("65c2913d-1b2c-4922-808f-a29b1ef1e575"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}) node_id = 101 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92302025-03-07T23:12:22.022ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92312025-03-07T23:12:22.034ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 102 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92322025-03-07T23:12:22.040ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92332025-03-07T23:12:22.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 102 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92342025-03-07T23:12:22.047ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92352025-03-07T23:12:22.052ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 103 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92362025-03-07T23:12:22.060ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92372025-03-07T23:12:22.061ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 103 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92382025-03-07T23:12:22.073ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92392025-03-07T23:12:22.074ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 104 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92402025-03-07T23:12:22.081ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92412025-03-07T23:12:22.083ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 104 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92422025-03-07T23:12:22.091ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92432025-03-07T23:12:22.091ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 105 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92442025-03-07T23:12:22.105ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92452025-03-07T23:12:22.106ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d6cb58e8-45dc-4f8d-8182-c3b9f64b220a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}) node_id = 105 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92462025-03-07T23:12:22.119ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92472025-03-07T23:12:22.122ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 106 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92482025-03-07T23:12:22.152ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92492025-03-07T23:12:22.153ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 106 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92502025-03-07T23:12:22.161ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92512025-03-07T23:12:22.161ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 107 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92522025-03-07T23:12:22.194ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92532025-03-07T23:12:22.194ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 107 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92542025-03-07T23:12:22.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92552025-03-07T23:12:22.238ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92562025-03-07T23:12:22.238ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
92572025-03-07T23:12:22.238ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
92582025-03-07T23:12:22.247ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92592025-03-07T23:12:22.247ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 108 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92602025-03-07T23:12:22.255ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
92612025-03-07T23:12:22.255ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
92622025-03-07T23:12:22.259ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92632025-03-07T23:12:22.264ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 108 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92642025-03-07T23:12:22.264ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
92652025-03-07T23:12:22.264ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92662025-03-07T23:12:22.274ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92672025-03-07T23:12:22.275ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 109 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92682025-03-07T23:12:22.298ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92692025-03-07T23:12:22.299ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("39fc03b2-7866-4eef-9ae6-03f3ee255cb5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}) node_id = 109 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92702025-03-07T23:12:22.304ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92712025-03-07T23:12:22.304ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 110 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92722025-03-07T23:12:22.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
92732025-03-07T23:12:22.324ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92742025-03-07T23:12:22.325ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 110 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92752025-03-07T23:12:22.331ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92762025-03-07T23:12:22.334ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 111 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92772025-03-07T23:12:22.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92782025-03-07T23:12:22.345ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 111 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92792025-03-07T23:12:22.355ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92802025-03-07T23:12:22.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 112 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92812025-03-07T23:12:22.363ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92822025-03-07T23:12:22.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 112 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92832025-03-07T23:12:22.373ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92842025-03-07T23:12:22.373ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 113 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92852025-03-07T23:12:22.387ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92862025-03-07T23:12:22.399ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d98ec7d4-d295-49bf-ab18-676c5a86ce7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}) node_id = 113 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92872025-03-07T23:12:22.399ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92882025-03-07T23:12:22.400ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 114 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92892025-03-07T23:12:22.401ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92902025-03-07T23:12:22.403ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 114 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92912025-03-07T23:12:22.420ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92922025-03-07T23:12:22.420ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 115 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92932025-03-07T23:12:22.433ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92942025-03-07T23:12:22.435ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 115 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92952025-03-07T23:12:22.447ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92962025-03-07T23:12:22.447ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 116 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92972025-03-07T23:12:22.460ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
92982025-03-07T23:12:22.460ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 116 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
92992025-03-07T23:12:22.470ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93002025-03-07T23:12:22.470ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 117 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93012025-03-07T23:12:22.483ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93022025-03-07T23:12:22.483ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("71d65ae9-64ee-4d30-a6de-1ec780ce30a3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}) node_id = 117 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93032025-03-07T23:12:22.493ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93042025-03-07T23:12:22.493ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 118 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93052025-03-07T23:12:22.503ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93062025-03-07T23:12:22.505ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 118 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93072025-03-07T23:12:22.513ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93082025-03-07T23:12:22.514ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 119 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93092025-03-07T23:12:22.525ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93102025-03-07T23:12:22.525ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 119 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93112025-03-07T23:12:22.531ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93122025-03-07T23:12:22.531ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 120 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93132025-03-07T23:12:22.539ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93142025-03-07T23:12:22.540ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 120 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93152025-03-07T23:12:22.549ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93162025-03-07T23:12:22.550ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 121 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93172025-03-07T23:12:22.561ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93182025-03-07T23:12:22.561ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("a5d7fbc5-14fb-4ad5-a247-c470f5e4b57d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}) node_id = 121 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93192025-03-07T23:12:22.584ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93202025-03-07T23:12:22.584ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 122 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93212025-03-07T23:12:22.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93222025-03-07T23:12:22.589ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93232025-03-07T23:12:22.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93242025-03-07T23:12:22.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93252025-03-07T23:12:22.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93262025-03-07T23:12:22.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
93272025-03-07T23:12:22.599ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93282025-03-07T23:12:22.600ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 122 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93292025-03-07T23:12:22.609ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93302025-03-07T23:12:22.610ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 123 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93312025-03-07T23:12:22.616ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93322025-03-07T23:12:22.616ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 123 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93332025-03-07T23:12:22.624ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93342025-03-07T23:12:22.624ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 124 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93352025-03-07T23:12:22.637ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93362025-03-07T23:12:22.637ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 124 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93372025-03-07T23:12:22.646ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93382025-03-07T23:12:22.647ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 125 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93392025-03-07T23:12:22.656ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93402025-03-07T23:12:22.656ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("df44237a-180a-486b-a934-4706be7a95eb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}) node_id = 125 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93412025-03-07T23:12:22.669ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93422025-03-07T23:12:22.670ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 126 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93432025-03-07T23:12:22.682ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93442025-03-07T23:12:22.683ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 126 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93452025-03-07T23:12:22.692ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93462025-03-07T23:12:22.693ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 127 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93472025-03-07T23:12:22.703ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93482025-03-07T23:12:22.704ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 127 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93492025-03-07T23:12:22.717ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93502025-03-07T23:12:22.718ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 128 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93512025-03-07T23:12:22.725ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93522025-03-07T23:12:22.725ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 128 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93532025-03-07T23:12:22.738ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93542025-03-07T23:12:22.739ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 129 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93552025-03-07T23:12:22.744ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93562025-03-07T23:12:22.745ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("61a16942-c253-478d-8b3d-f77bc708744d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}) node_id = 129 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93572025-03-07T23:12:22.753ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93582025-03-07T23:12:22.753ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 130 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93592025-03-07T23:12:22.760ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93602025-03-07T23:12:22.761ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 130 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93612025-03-07T23:12:22.777ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93622025-03-07T23:12:22.777ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 131 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93632025-03-07T23:12:22.791ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93642025-03-07T23:12:22.791ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 131 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93652025-03-07T23:12:22.806ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93662025-03-07T23:12:22.806ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 132 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93672025-03-07T23:12:22.814ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93682025-03-07T23:12:22.815ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 132 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93692025-03-07T23:12:22.822ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93702025-03-07T23:12:22.822ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 133 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93712025-03-07T23:12:22.828ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93722025-03-07T23:12:22.829ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("4e4826ad-ccf7-48f4-99e9-36d9674db870"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}) node_id = 133 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93732025-03-07T23:12:22.837ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93742025-03-07T23:12:22.838ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 134 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93752025-03-07T23:12:22.844ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93762025-03-07T23:12:22.844ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 134 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93772025-03-07T23:12:22.858ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93782025-03-07T23:12:22.858ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 135 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93792025-03-07T23:12:22.866ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93802025-03-07T23:12:22.866ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 135 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93812025-03-07T23:12:22.877ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93822025-03-07T23:12:22.877ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 136 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93832025-03-07T23:12:22.883ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93842025-03-07T23:12:22.884ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 136 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93852025-03-07T23:12:22.890ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93862025-03-07T23:12:22.891ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 137 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93872025-03-07T23:12:22.897ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93882025-03-07T23:12:22.897ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("1b4566c0-5564-448a-9fcf-46d9327cbe1d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}) node_id = 137 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93892025-03-07T23:12:22.906ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93902025-03-07T23:12:22.906ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 138 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93912025-03-07T23:12:22.912ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93922025-03-07T23:12:22.913ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 138 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93932025-03-07T23:12:22.917ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93942025-03-07T23:12:22.919ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 139 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93952025-03-07T23:12:22.924ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93962025-03-07T23:12:22.925ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 139 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93972025-03-07T23:12:22.932ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
93982025-03-07T23:12:22.932ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 140 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
93992025-03-07T23:12:22.939ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94002025-03-07T23:12:22.940ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 140 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94012025-03-07T23:12:22.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94022025-03-07T23:12:22.956ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 141 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94032025-03-07T23:12:22.966ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94042025-03-07T23:12:22.967ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d9534762-c675-4c79-9c56-57fade27f5e6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}) node_id = 141 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94052025-03-07T23:12:22.974ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94062025-03-07T23:12:22.974ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 142 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94072025-03-07T23:12:22.981ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94082025-03-07T23:12:22.981ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 142 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94092025-03-07T23:12:22.988ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94102025-03-07T23:12:22.990ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 143 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94112025-03-07T23:12:22.995ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94122025-03-07T23:12:22.995ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 143 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94132025-03-07T23:12:23.003ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94142025-03-07T23:12:23.004ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 144 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94152025-03-07T23:12:23.010ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94162025-03-07T23:12:23.011ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 144 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94172025-03-07T23:12:23.017ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94182025-03-07T23:12:23.018ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 145 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94192025-03-07T23:12:23.025ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94202025-03-07T23:12:23.026ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("6f0fa699-ee98-41d7-a9a1-7136986496b6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}) node_id = 145 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94212025-03-07T23:12:23.032ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94222025-03-07T23:12:23.033ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 146 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94232025-03-07T23:12:23.039ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94242025-03-07T23:12:23.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 146 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94252025-03-07T23:12:23.047ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94262025-03-07T23:12:23.047ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 147 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94272025-03-07T23:12:23.054ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94282025-03-07T23:12:23.055ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 147 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94292025-03-07T23:12:23.061ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94302025-03-07T23:12:23.061ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 148 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94312025-03-07T23:12:23.067ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94322025-03-07T23:12:23.068ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 148 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94332025-03-07T23:12:23.073ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94342025-03-07T23:12:23.073ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 149 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94352025-03-07T23:12:23.080ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94362025-03-07T23:12:23.080ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("3a83a775-3be7-4e0b-b158-7fbee9884ea4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}) node_id = 149 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94372025-03-07T23:12:23.088ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94382025-03-07T23:12:23.088ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 150 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94392025-03-07T23:12:23.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94402025-03-07T23:12:23.097ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 150 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94412025-03-07T23:12:23.104ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94422025-03-07T23:12:23.105ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 151 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94432025-03-07T23:12:23.112ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94442025-03-07T23:12:23.112ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 151 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94452025-03-07T23:12:23.118ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94462025-03-07T23:12:23.118ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 152 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94472025-03-07T23:12:23.124ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94482025-03-07T23:12:23.124ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 152 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94492025-03-07T23:12:23.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94502025-03-07T23:12:23.131ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 153 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94512025-03-07T23:12:23.138ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94522025-03-07T23:12:23.139ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bba1ca14-dceb-41a2-a57d-b90bc561735f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}) node_id = 153 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94532025-03-07T23:12:23.147ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94542025-03-07T23:12:23.148ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 154 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94552025-03-07T23:12:23.156ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94562025-03-07T23:12:23.156ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 154 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94572025-03-07T23:12:23.162ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94582025-03-07T23:12:23.162ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 155 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94592025-03-07T23:12:23.172ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94602025-03-07T23:12:23.172ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 155 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94612025-03-07T23:12:23.181ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94622025-03-07T23:12:23.186ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 156 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94632025-03-07T23:12:23.195ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94642025-03-07T23:12:23.195ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 156 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94652025-03-07T23:12:23.208ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94662025-03-07T23:12:23.208ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 157 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94672025-03-07T23:12:23.216ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94682025-03-07T23:12:23.216ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("e290151b-46c5-4018-9076-9878df75e61f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}) node_id = 157 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94692025-03-07T23:12:23.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
94702025-03-07T23:12:23.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
94712025-03-07T23:12:23.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
94722025-03-07T23:12:23.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
94732025-03-07T23:12:23.224ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94742025-03-07T23:12:23.224ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 158 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94752025-03-07T23:12:23.230ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
94762025-03-07T23:12:23.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
94772025-03-07T23:12:23.232ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
94782025-03-07T23:12:23.233ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
94792025-03-07T23:12:23.234ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94802025-03-07T23:12:23.234ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 158 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94812025-03-07T23:12:23.242ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94822025-03-07T23:12:23.242ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 159 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94832025-03-07T23:12:23.248ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94842025-03-07T23:12:23.248ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 159 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94852025-03-07T23:12:23.255ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94862025-03-07T23:12:23.257ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 160 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94872025-03-07T23:12:23.261ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94882025-03-07T23:12:23.261ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 160 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94892025-03-07T23:12:23.266ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94902025-03-07T23:12:23.266ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 161 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94912025-03-07T23:12:23.274ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94922025-03-07T23:12:23.274ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("85cde240-c2a7-46fb-9fb8-9ec8e834a37d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}) node_id = 161 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94932025-03-07T23:12:23.279ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94942025-03-07T23:12:23.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 162 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94952025-03-07T23:12:23.284ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94962025-03-07T23:12:23.285ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 162 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94972025-03-07T23:12:23.291ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
94982025-03-07T23:12:23.291ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 163 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
94992025-03-07T23:12:23.297ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95002025-03-07T23:12:23.297ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 163 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95012025-03-07T23:12:23.305ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95022025-03-07T23:12:23.306ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 164 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95032025-03-07T23:12:23.311ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95042025-03-07T23:12:23.311ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 164 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95052025-03-07T23:12:23.321ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95062025-03-07T23:12:23.321ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 165 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95072025-03-07T23:12:23.327ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
95082025-03-07T23:12:23.330ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95092025-03-07T23:12:23.330ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 165 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95102025-03-07T23:12:23.339ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95112025-03-07T23:12:23.339ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 166 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95122025-03-07T23:12:23.374ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95132025-03-07T23:12:23.374ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 166 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95142025-03-07T23:12:23.386ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95152025-03-07T23:12:23.386ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 168 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95162025-03-07T23:12:23.393ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95172025-03-07T23:12:23.393ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 168 saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95182025-03-07T23:12:23.402ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95192025-03-07T23:12:23.402ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec
95202025-03-07T23:12:23.425ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95212025-03-07T23:12:23.427ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 525229e1-ef8d-4ba0-af0d-ad3346f14eec saga_name = instance-create saga_result = SagaResult { saga_id: 525229e1-ef8d-4ba0-af0d-ad3346f14eec, saga_log: SagaLog { saga_id: 525229e1-ef8d-4ba0-af0d-ad3346f14eec, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:12:19.575193Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:19.575193Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:19.575193Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("438b0157-26a1-4c8f-93a7-06021c6de471"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("207b9b37-24c5-4569-96e0-45f9b68e8780"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("7d7ae50e-e233-48fc-b4d3-2d3436115ea3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d84afb9c-8cd6-42f5-aa90-6563a4b2b2d0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("882fb927-df75-4d42-b10c-71efd1b7c905"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("10350c21-ee77-43c8-ac53-b47e4cfd3548"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("ff681884-b841-40a9-bad2-353b2af20d54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("9fa0c029-242e-4114-96bb-ad661e95eea1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("03b27c13-f953-40ac-b57a-073cd8cedb78")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}), 40: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}), 41: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("920d823e-6e25-4667-88d3-26ffa2ed4100"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b1ee1ef1-8457-412e-b4f7-fbefea72e444"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("81817801-88c9-4d13-ab32-8d0e662fe0cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("161c5f5a-bffa-411f-90e2-c03bee50c8da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("17a1e05b-96db-45cf-869b-5d594c6dd6b5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("589c77be-49f8-4a96-b796-34b3d446c87d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("16961a94-f45e-42de-b0c2-cf594df2aa9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("5728f97d-6218-4f51-a616-760d796feed7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("888ffee3-ba14-47d4-b2e5-2407d4233f83"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bdea35dd-f04e-4a00-ae99-461d45039ca9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("08f42837-c0e0-470f-a043-5b350bc18e7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("44e03546-0cff-44bd-92a8-39f98489545b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("62026d64-f595-4a2a-8b89-6b4fd2349d95"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b9aff95e-3edd-49f1-92b8-d4ef638fe94c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("cb5114c1-8e11-40ad-9aba-4b70271a7eed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("65c2913d-1b2c-4922-808f-a29b1ef1e575"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d6cb58e8-45dc-4f8d-8182-c3b9f64b220a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("39fc03b2-7866-4eef-9ae6-03f3ee255cb5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d98ec7d4-d295-49bf-ab18-676c5a86ce7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("71d65ae9-64ee-4d30-a6de-1ec780ce30a3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("a5d7fbc5-14fb-4ad5-a247-c470f5e4b57d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("df44237a-180a-486b-a934-4706be7a95eb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("61a16942-c253-478d-8b3d-f77bc708744d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("4e4826ad-ccf7-48f4-99e9-36d9674db870"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("1b4566c0-5564-448a-9fcf-46d9327cbe1d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d9534762-c675-4c79-9c56-57fade27f5e6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("6f0fa699-ee98-41d7-a9a1-7136986496b6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("3a83a775-3be7-4e0b-b158-7fbee9884ea4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bba1ca14-dceb-41a2-a57d-b90bc561735f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("e290151b-46c5-4018-9076-9878df75e61f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("85cde240-c2a7-46fb-9fb8-9ec8e834a37d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Object {"description": Null, "first_port": Number(0), "id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("62016451-f62c-4aaf-b816-4ec2f9a8d1be"), "ip_pool_range_id": String("ae9c2475-313f-4074-8cb0-160a5e2a6b05"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:12:20.811339Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:20.858180Z")}, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("56a6c987-4c1c-4b66-af86-9b3304c2ba6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("920d823e-6e25-4667-88d3-26ffa2ed4100"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bdea35dd-f04e-4a00-ae99-461d45039ca9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("08f42837-c0e0-470f-a043-5b350bc18e7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("44e03546-0cff-44bd-92a8-39f98489545b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("62026d64-f595-4a2a-8b89-6b4fd2349d95"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b9aff95e-3edd-49f1-92b8-d4ef638fe94c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("cb5114c1-8e11-40ad-9aba-4b70271a7eed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("65c2913d-1b2c-4922-808f-a29b1ef1e575"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d6cb58e8-45dc-4f8d-8182-c3b9f64b220a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("39fc03b2-7866-4eef-9ae6-03f3ee255cb5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d98ec7d4-d295-49bf-ab18-676c5a86ce7f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("b1ee1ef1-8457-412e-b4f7-fbefea72e444"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("71d65ae9-64ee-4d30-a6de-1ec780ce30a3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("a5d7fbc5-14fb-4ad5-a247-c470f5e4b57d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("df44237a-180a-486b-a934-4706be7a95eb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("61a16942-c253-478d-8b3d-f77bc708744d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("4e4826ad-ccf7-48f4-99e9-36d9674db870"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("1b4566c0-5564-448a-9fcf-46d9327cbe1d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d9534762-c675-4c79-9c56-57fade27f5e6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("6f0fa699-ee98-41d7-a9a1-7136986496b6"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("3a83a775-3be7-4e0b-b158-7fbee9884ea4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("bba1ca14-dceb-41a2-a57d-b90bc561735f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("81817801-88c9-4d13-ab32-8d0e662fe0cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("e290151b-46c5-4018-9076-9878df75e61f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("85cde240-c2a7-46fb-9fb8-9ec8e834a37d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("161c5f5a-bffa-411f-90e2-c03bee50c8da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("17a1e05b-96db-45cf-869b-5d594c6dd6b5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("589c77be-49f8-4a96-b796-34b3d446c87d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("16961a94-f45e-42de-b0c2-cf594df2aa9d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("5728f97d-6218-4f51-a616-760d796feed7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("888ffee3-ba14-47d4-b2e5-2407d4233f83"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:12:19.575193Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:19.575193Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:12:19.575193Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("438b0157-26a1-4c8f-93a7-06021c6de471"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("207b9b37-24c5-4569-96e0-45f9b68e8780"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("7d7ae50e-e233-48fc-b4d3-2d3436115ea3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("d84afb9c-8cd6-42f5-aa90-6563a4b2b2d0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("882fb927-df75-4d42-b10c-71efd1b7c905"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("10350c21-ee77-43c8-ac53-b47e4cfd3548"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("ff681884-b841-40a9-bad2-353b2af20d54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a"), "new_id": String("9fa0c029-242e-4114-96bb-ad661e95eea1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("03b27c13-f953-40ac-b57a-073cd8cedb78"), "stopped_instance": Null} }) }
95222025-03-07T23:12:23.429ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95232025-03-07T23:12:23.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95242025-03-07T23:12:23.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95252025-03-07T23:12:23.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95262025-03-07T23:12:23.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95272025-03-07T23:12:23.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95282025-03-07T23:12:23.432ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95292025-03-07T23:12:23.438ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95302025-03-07T23:12:23.441ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95312025-03-07T23:12:23.441ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } uri = /v1/instances?project=demo-project
95322025-03-07T23:12:23.442ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
95332025-03-07T23:12:23.442ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95342025-03-07T23:12:23.442ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95352025-03-07T23:12:23.442ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95362025-03-07T23:12:23.442ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
95372025-03-07T23:12:23.442ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95382025-03-07T23:12:23.442ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95392025-03-07T23:12:23.442ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95402025-03-07T23:12:23.446ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
95412025-03-07T23:12:23.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95422025-03-07T23:12:23.446ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95432025-03-07T23:12:23.446ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95442025-03-07T23:12:23.452ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
95452025-03-07T23:12:23.459ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) uri = /v1/instances?project=demo-project
95462025-03-07T23:12:23.459ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } uri = /v1/instances?project=demo-project
95472025-03-07T23:12:23.459ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
95482025-03-07T23:12:23.459ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95492025-03-07T23:12:23.459ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95502025-03-07T23:12:23.460ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95512025-03-07T23:12:23.472ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
95522025-03-07T23:12:23.473ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95532025-03-07T23:12:23.473ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95542025-03-07T23:12:23.473ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95552025-03-07T23:12:23.477ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
95562025-03-07T23:12:23.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95572025-03-07T23:12:23.478ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95582025-03-07T23:12:23.478ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95592025-03-07T23:12:23.481ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
95602025-03-07T23:12:23.491ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) uri = /v1/instances?project=demo-project
95612025-03-07T23:12:23.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
95622025-03-07T23:12:23.492ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
95632025-03-07T23:12:23.492ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
95642025-03-07T23:12:23.495ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start
95652025-03-07T23:12:23.496ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"demo-instance","identity":{"description":"","id":"f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a","name":"demo-stopped-instance","time_created":"2025-03-07T23:12:19.575193Z","time_deleted":null,"time_modified":"2025-03-07T23:12:19.575193Z"},"memory":17179869184,"ncpus":1,"project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-07T23:12:19.575193Z"},"updater_gen":1,"updater_id":null,"user_data":[]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10} saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95662025-03-07T23:12:23.496ZINFOtest_unauthorized (SecStore): creating saga saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start
95672025-03-07T23:12:23.504ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start
95682025-03-07T23:12:23.504ZINFOtest_unauthorized (SEC): saga start saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95692025-03-07T23:12:23.504ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95702025-03-07T23:12:23.504ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95712025-03-07T23:12:23.514ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95722025-03-07T23:12:23.514ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95732025-03-07T23:12:23.523ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95742025-03-07T23:12:23.524ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95752025-03-07T23:12:23.530ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95762025-03-07T23:12:23.530ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("56177169-c431-401b-8632-1024e2024455")) node_id = 0 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95772025-03-07T23:12:23.536ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95782025-03-07T23:12:23.536ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95792025-03-07T23:12:23.561ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
95802025-03-07T23:12:23.561ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
95812025-03-07T23:12:23.562ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
95822025-03-07T23:12:23.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
95832025-03-07T23:12:23.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95842025-03-07T23:12:23.575ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 24a535eb-960f-44c0-9dd9-26f98d16d370 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95852025-03-07T23:12:23.575ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 24a535eb-960f-44c0-9dd9-26f98d16d370 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95862025-03-07T23:12:23.575ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 24a535eb-960f-44c0-9dd9-26f98d16d370 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95872025-03-07T23:12:23.576ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 24a535eb-960f-44c0-9dd9-26f98d16d370 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95882025-03-07T23:12:23.578ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 failed sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
95892025-03-07T23:12:23.578ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Failed(ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }) node_id = 1 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
95902025-03-07T23:12:23.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11238 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 24a535eb-960f-44c0-9dd9-26f98d16d370 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
95912025-03-07T23:12:23.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
95922025-03-07T23:12:23.591ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "24a535eb-960f-44c0-9dd9-26f98d16d370", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:22 GMT"} })
95932025-03-07T23:12:23.591ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
95942025-03-07T23:12:23.592ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
95952025-03-07T23:12:23.592ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ccfa465c-a3da-430a-b1db-c6bb99fd5c5e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
95962025-03-07T23:12:23.592ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ccfa465c-a3da-430a-b1db-c6bb99fd5c5e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
95972025-03-07T23:12:23.592ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ccfa465c-a3da-430a-b1db-c6bb99fd5c5e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
95982025-03-07T23:12:23.594ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ccfa465c-a3da-430a-b1db-c6bb99fd5c5e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
95992025-03-07T23:12:23.595ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Unwinding saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96002025-03-07T23:12:23.597ZINFOtest_unauthorized (SecStore): updating state new_state = unwinding saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96012025-03-07T23:12:23.597ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
96022025-03-07T23:12:23.597ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
96032025-03-07T23:12:23.597ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
96042025-03-07T23:12:23.597ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
96052025-03-07T23:12:23.601ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9491 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = ccfa465c-a3da-430a-b1db-c6bb99fd5c5e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
96062025-03-07T23:12:23.603ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "ccfa465c-a3da-430a-b1db-c6bb99fd5c5e", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:23 GMT"} })
96072025-03-07T23:12:23.603ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
96082025-03-07T23:12:23.603ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96092025-03-07T23:12:23.603ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
96102025-03-07T23:12:23.618ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 undo_started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96112025-03-07T23:12:23.618ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoStarted node_id = 0 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96122025-03-07T23:12:23.624ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 undo_finished sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96132025-03-07T23:12:23.625ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoFinished node_id = 0 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96142025-03-07T23:12:23.629ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96152025-03-07T23:12:23.629ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96162025-03-07T23:12:23.629ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = d4aa5338-b052-4dfb-a4d1-8b0520d1c522 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96172025-03-07T23:12:23.649ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 19787 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = d4aa5338-b052-4dfb-a4d1-8b0520d1c522 response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96182025-03-07T23:12:23.650ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 undo_started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96192025-03-07T23:12:23.650ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoStarted node_id = 10 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96202025-03-07T23:12:23.652ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96212025-03-07T23:12:23.677ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96222025-03-07T23:12:23.677ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96232025-03-07T23:12:23.677ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96242025-03-07T23:12:23.677ZDEBGtest_unauthorized (results-sink): inserting 24 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
96252025-03-07T23:12:23.677ZDEBGtest_unauthorized (results-sink-cluster): inserting 24 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
96262025-03-07T23:12:23.677ZDEBGtest_unauthorized (clickhouse-client): unrolling 24 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
96272025-03-07T23:12:23.703ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 36 sql = INSERT INTO oximeter.fields_string FORMAT Native
96282025-03-07T23:12:23.703ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 undo_finished sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96292025-03-07T23:12:23.703ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoFinished node_id = 10 saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96302025-03-07T23:12:23.708ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 36 table_name = fields_string
96312025-03-07T23:12:23.708ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 17 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
96322025-03-07T23:12:23.711ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
96332025-03-07T23:12:23.711ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b
96342025-03-07T23:12:23.712ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 17 table_name = fields_u16
96352025-03-07T23:12:23.713ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 23 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
96362025-03-07T23:12:23.717ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 23 table_name = fields_uuid
96372025-03-07T23:12:23.718ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 17 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
96382025-03-07T23:12:23.739ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 17 table_name = measurements_histogramu64
96392025-03-07T23:12:23.740ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 7 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
96402025-03-07T23:12:23.740ZWARNtest_unauthorized (SEC): saga finished action_error_node_name = "sled_id" action_error_source = ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} } result = failure saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8 undo_result = success
96412025-03-07T23:12:23.740ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 60fc5ed3-0b5c-413c-85e8-00513f94a53b saga_name = instance-start saga_result = SagaResult { saga_id: 60fc5ed3-0b5c-413c-85e8-00513f94a53b, saga_log: SagaLog { saga_id: 60fc5ed3-0b5c-413c-85e8-00513f94a53b, unwinding: true, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 failed, N000 undo_started, N000 undo_finished, N010 undo_started, N010 undo_finished], node_status: {0: UndoFinished, 1: Failed(ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }), 10: UndoFinished} }, kind: Err(SagaResultErr { error_node_name: "sled_id", error_source: ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }, undo_failure: None }) }
96422025-03-07T23:12:23.740ZINFOtest_unauthorized (nexus): failed to start newly-created instance error = Other(InsufficientCapacity { message: MessagePair { external_message: "Failed to place instance: Could not find any valid sled on which this instance can be placed", internal_context: "saga ACTION error at node \\"sled_id\\": Failed to place instance: Could not find any valid sled on which this instance can be placed" } }) instance_id = f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a
96432025-03-07T23:12:23.740ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96442025-03-07T23:12:23.740ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96452025-03-07T23:12:23.740ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96462025-03-07T23:12:23.740ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 5 reason = Signaled
96472025-03-07T23:12:23.741ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
96482025-03-07T23:12:23.741ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
96492025-03-07T23:12:23.741ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
96502025-03-07T23:12:23.741ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
96512025-03-07T23:12:23.741ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
96522025-03-07T23:12:23.741ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
96532025-03-07T23:12:23.744ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96542025-03-07T23:12:23.744ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96552025-03-07T23:12:23.747ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96562025-03-07T23:12:23.749ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
96572025-03-07T23:12:23.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
96582025-03-07T23:12:23.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
96592025-03-07T23:12:23.750ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
96602025-03-07T23:12:23.751ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
96612025-03-07T23:12:23.751ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
96622025-03-07T23:12:23.751ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
96632025-03-07T23:12:23.753ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 7 table_name = measurements_i64
96642025-03-07T23:12:23.753ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
96652025-03-07T23:12:23.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96662025-03-07T23:12:23.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96672025-03-07T23:12:23.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96682025-03-07T23:12:23.754ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
96692025-03-07T23:12:23.759ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
96702025-03-07T23:12:23.759ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
96712025-03-07T23:12:23.759ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
96722025-03-07T23:12:23.759ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
96732025-03-07T23:12:23.761ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } uri = /v1/instances?project=demo-project
96742025-03-07T23:12:23.761ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
96752025-03-07T23:12:23.761ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96762025-03-07T23:12:23.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96772025-03-07T23:12:23.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96782025-03-07T23:12:23.811ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
96792025-03-07T23:12:23.812ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
96802025-03-07T23:12:23.812ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
96812025-03-07T23:12:23.812ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96822025-03-07T23:12:23.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96832025-03-07T23:12:23.813ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96842025-03-07T23:12:23.814ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34818 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
96852025-03-07T23:12:23.814ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
96862025-03-07T23:12:23.815ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34818 req_id = 3ab80323-c9e4-456a-a749-8f176b14e992 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
96872025-03-07T23:12:23.824ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
96882025-03-07T23:12:23.824ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
96892025-03-07T23:12:23.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
96902025-03-07T23:12:23.825ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
96912025-03-07T23:12:23.825ZINFOtest_unauthorized (dropshot): request completed latency_us = 10074 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34818 req_id = 3ab80323-c9e4-456a-a749-8f176b14e992 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
96922025-03-07T23:12:23.826ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "3ab80323-c9e4-456a-a749-8f176b14e992", "content-length": "212", "date": "Fri, 07 Mar 2025 23:12:23 GMT"} })
96932025-03-07T23:12:23.827ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
96942025-03-07T23:12:23.827ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
96952025-03-07T23:12:23.827ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
96962025-03-07T23:12:23.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
96972025-03-07T23:12:23.846ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) uri = /v1/instances?project=demo-project
96982025-03-07T23:12:23.846ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } uri = /v1/instances?project=demo-project
96992025-03-07T23:12:23.846ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
97002025-03-07T23:12:23.846ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
97012025-03-07T23:12:23.846ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
97022025-03-07T23:12:23.847ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
97032025-03-07T23:12:23.865ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
97042025-03-07T23:12:23.865ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
97052025-03-07T23:12:23.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
97062025-03-07T23:12:23.881ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
97072025-03-07T23:12:23.905ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
97082025-03-07T23:12:23.905ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
97092025-03-07T23:12:23.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
97102025-03-07T23:12:23.911ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
97112025-03-07T23:12:23.926ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
97122025-03-07T23:12:23.951ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ById(f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a) } result = Ok(()) uri = /v1/instances?project=demo-project
97132025-03-07T23:12:23.952ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database uri = /v1/instances?project=demo-project
97142025-03-07T23:12:23.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
97152025-03-07T23:12:23.953ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
97162025-03-07T23:12:23.961ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 4922839 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06adaaed-d704-4591-9c1f-759b7f7c77cf response_code = 201 uri = /v1/instances?project=demo-project
97172025-03-07T23:12:23.962ZINFOtest_unauthorized (external client test context): client received response status = 201
97182025-03-07T23:12:23.967ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
97192025-03-07T23:12:23.967ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f uri = /v1/affinity-groups?project=demo-project
97202025-03-07T23:12:23.968ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f uri = /v1/affinity-groups?project=demo-project
97212025-03-07T23:12:23.968ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
97222025-03-07T23:12:23.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97232025-03-07T23:12:23.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97242025-03-07T23:12:23.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97252025-03-07T23:12:23.972ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97262025-03-07T23:12:23.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97272025-03-07T23:12:23.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97282025-03-07T23:12:23.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
97292025-03-07T23:12:23.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
97302025-03-07T23:12:23.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97312025-03-07T23:12:23.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97322025-03-07T23:12:23.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97332025-03-07T23:12:23.979ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
97342025-03-07T23:12:23.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97352025-03-07T23:12:23.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97362025-03-07T23:12:23.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97372025-03-07T23:12:23.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
97382025-03-07T23:12:23.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
97392025-03-07T23:12:23.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97402025-03-07T23:12:23.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97412025-03-07T23:12:23.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97422025-03-07T23:12:23.986ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {82888c06-1920-48a3-9e72-2ad13a44d89e: {10.0.0.1: {8da10816-b560-4a3a-b871-ab8d72aaaf74}, 10.0.0.0: {8da10816-b560-4a3a-b871-ab8d72aaaf74}}} background_task = vpc_route_manager sled = sim-b6d65341
97432025-03-07T23:12:23.986ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
97442025-03-07T23:12:23.987ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34818 req_id = 581d7d8a-e379-49a9-825d-a3e70c5e8f2d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
97452025-03-07T23:12:23.987ZINFOtest_unauthorized (dropshot): request completed latency_us = 324 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34818 req_id = 581d7d8a-e379-49a9-825d-a3e70c5e8f2d response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
97462025-03-07T23:12:23.987ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "581d7d8a-e379-49a9-825d-a3e70c5e8f2d", "date": "Fri, 07 Mar 2025 23:12:23 GMT"} })
97472025-03-07T23:12:23.987ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97482025-03-07T23:12:23.987ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97492025-03-07T23:12:23.988ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97502025-03-07T23:12:23.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
97512025-03-07T23:12:23.988ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
97522025-03-07T23:12:23.989ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97532025-03-07T23:12:23.989ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97542025-03-07T23:12:23.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97552025-03-07T23:12:23.989ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97562025-03-07T23:12:23.990ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97572025-03-07T23:12:23.990ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97582025-03-07T23:12:23.991ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
97592025-03-07T23:12:23.991ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
97602025-03-07T23:12:23.991ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
97612025-03-07T23:12:23.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
97622025-03-07T23:12:23.993ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
97632025-03-07T23:12:23.998ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
97642025-03-07T23:12:23.998ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f uri = /v1/affinity-groups?project=demo-project
97652025-03-07T23:12:23.998ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
97662025-03-07T23:12:23.998ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
97672025-03-07T23:12:23.999ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
97682025-03-07T23:12:23.999ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97692025-03-07T23:12:24.000ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97702025-03-07T23:12:24.000ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97712025-03-07T23:12:24.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
97722025-03-07T23:12:24.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
97732025-03-07T23:12:24.021ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
97742025-03-07T23:12:24.022ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97752025-03-07T23:12:24.022ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97762025-03-07T23:12:24.022ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97772025-03-07T23:12:24.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
97782025-03-07T23:12:24.024ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
97792025-03-07T23:12:24.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
97802025-03-07T23:12:24.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
97812025-03-07T23:12:24.025ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
97822025-03-07T23:12:24.028ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
97832025-03-07T23:12:24.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
97842025-03-07T23:12:24.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
97852025-03-07T23:12:24.029ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
97862025-03-07T23:12:24.030ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97872025-03-07T23:12:24.030ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97882025-03-07T23:12:24.030ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97892025-03-07T23:12:24.033ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97902025-03-07T23:12:24.033ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97912025-03-07T23:12:24.033ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97922025-03-07T23:12:24.034ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
97932025-03-07T23:12:24.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
97942025-03-07T23:12:24.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
97952025-03-07T23:12:24.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
97962025-03-07T23:12:24.037ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
97972025-03-07T23:12:24.038ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
97982025-03-07T23:12:24.039ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
97992025-03-07T23:12:24.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
98002025-03-07T23:12:24.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98012025-03-07T23:12:24.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
98022025-03-07T23:12:24.047ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
98032025-03-07T23:12:24.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
98042025-03-07T23:12:24.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
98052025-03-07T23:12:24.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98062025-03-07T23:12:24.049ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) }
98072025-03-07T23:12:24.050ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
98082025-03-07T23:12:24.050ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98092025-03-07T23:12:24.050ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98102025-03-07T23:12:24.050ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98112025-03-07T23:12:24.051ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
98122025-03-07T23:12:24.052ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98132025-03-07T23:12:24.052ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98142025-03-07T23:12:24.052ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98152025-03-07T23:12:24.053ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
98162025-03-07T23:12:24.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
98172025-03-07T23:12:24.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
98182025-03-07T23:12:24.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98192025-03-07T23:12:24.059ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
98202025-03-07T23:12:24.059ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98212025-03-07T23:12:24.059ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98222025-03-07T23:12:24.060ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98232025-03-07T23:12:24.063ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
98242025-03-07T23:12:24.074ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(())
98252025-03-07T23:12:24.074ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user background_task = vpc_route_manager
98262025-03-07T23:12:24.074ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) }
98272025-03-07T23:12:24.074ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
98282025-03-07T23:12:24.074ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98292025-03-07T23:12:24.074ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98302025-03-07T23:12:24.075ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98312025-03-07T23:12:24.075ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
98322025-03-07T23:12:24.076ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
98332025-03-07T23:12:24.076ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
98342025-03-07T23:12:24.076ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98352025-03-07T23:12:24.077ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
98362025-03-07T23:12:24.077ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98372025-03-07T23:12:24.077ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98382025-03-07T23:12:24.078ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98392025-03-07T23:12:24.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
98402025-03-07T23:12:24.086ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98412025-03-07T23:12:24.087ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database uri = /v1/affinity-groups?project=demo-project
98422025-03-07T23:12:24.087ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
98432025-03-07T23:12:24.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
98442025-03-07T23:12:24.087ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
98452025-03-07T23:12:24.087ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98462025-03-07T23:12:24.087ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98472025-03-07T23:12:24.089ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98482025-03-07T23:12:24.096ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
98492025-03-07T23:12:24.106ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: ee83adeb-389f-4e4b-93ed-ff6d673abfc3, lookup_type: ById(ee83adeb-389f-4e4b-93ed-ff6d673abfc3) } result = Ok(())
98502025-03-07T23:12:24.106ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98512025-03-07T23:12:24.107ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98522025-03-07T23:12:24.107ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98532025-03-07T23:12:24.114ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98542025-03-07T23:12:24.114ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98552025-03-07T23:12:24.115ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98562025-03-07T23:12:24.117ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98572025-03-07T23:12:24.118ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98582025-03-07T23:12:24.118ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98592025-03-07T23:12:24.131ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98602025-03-07T23:12:24.131ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98612025-03-07T23:12:24.132ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98622025-03-07T23:12:24.141ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98632025-03-07T23:12:24.141ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98642025-03-07T23:12:24.144ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98652025-03-07T23:12:24.153ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ById(4f79228f-8563-45f6-b35f-b99826cfcc94) }
98662025-03-07T23:12:24.154ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
98672025-03-07T23:12:24.156ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98682025-03-07T23:12:24.157ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98692025-03-07T23:12:24.157ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98702025-03-07T23:12:24.168ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
98712025-03-07T23:12:24.168ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98722025-03-07T23:12:24.168ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98732025-03-07T23:12:24.170ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98742025-03-07T23:12:24.178ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
98752025-03-07T23:12:24.178ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98762025-03-07T23:12:24.179ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98772025-03-07T23:12:24.179ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98782025-03-07T23:12:24.184ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
98792025-03-07T23:12:24.195ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ById(4f79228f-8563-45f6-b35f-b99826cfcc94) } result = Ok(())
98802025-03-07T23:12:24.199ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
98812025-03-07T23:12:24.199ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98822025-03-07T23:12:24.199ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98832025-03-07T23:12:24.199ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98842025-03-07T23:12:24.206ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
98852025-03-07T23:12:24.206ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
98862025-03-07T23:12:24.207ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
98872025-03-07T23:12:24.213ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 245951 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ceb1edd0-416c-46ab-8d58-d3f74bd7eb6f response_code = 201 uri = /v1/affinity-groups?project=demo-project
98882025-03-07T23:12:24.214ZINFOtest_unauthorized (external client test context): client received response status = 201
98892025-03-07T23:12:24.215ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
98902025-03-07T23:12:24.215ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
98912025-03-07T23:12:24.215ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
98922025-03-07T23:12:24.215ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
98932025-03-07T23:12:24.215ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
98942025-03-07T23:12:24.215ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
98952025-03-07T23:12:24.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
98962025-03-07T23:12:24.218ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
98972025-03-07T23:12:24.219ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
98982025-03-07T23:12:24.219ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
98992025-03-07T23:12:24.220ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99002025-03-07T23:12:24.220ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99012025-03-07T23:12:24.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
99022025-03-07T23:12:24.224ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
99032025-03-07T23:12:24.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
99042025-03-07T23:12:24.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99052025-03-07T23:12:24.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99062025-03-07T23:12:24.225ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99072025-03-07T23:12:24.225ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99082025-03-07T23:12:24.225ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99092025-03-07T23:12:24.226ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
99102025-03-07T23:12:24.227ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
99112025-03-07T23:12:24.228ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99122025-03-07T23:12:24.228ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99132025-03-07T23:12:24.231ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99142025-03-07T23:12:24.231ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99152025-03-07T23:12:24.232ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99162025-03-07T23:12:24.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
99172025-03-07T23:12:24.262ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
99182025-03-07T23:12:24.263ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
99192025-03-07T23:12:24.263ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99202025-03-07T23:12:24.265ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99212025-03-07T23:12:24.268ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") }
99222025-03-07T23:12:24.268ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
99232025-03-07T23:12:24.268ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99242025-03-07T23:12:24.268ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99252025-03-07T23:12:24.269ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99262025-03-07T23:12:24.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
99272025-03-07T23:12:24.270ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
99282025-03-07T23:12:24.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
99292025-03-07T23:12:24.271ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99302025-03-07T23:12:24.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99312025-03-07T23:12:24.272ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
99322025-03-07T23:12:24.272ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99332025-03-07T23:12:24.273ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99342025-03-07T23:12:24.274ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99352025-03-07T23:12:24.276ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
99362025-03-07T23:12:24.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
99372025-03-07T23:12:24.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
99382025-03-07T23:12:24.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
99392025-03-07T23:12:24.278ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
99402025-03-07T23:12:24.278ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99412025-03-07T23:12:24.278ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99422025-03-07T23:12:24.278ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99432025-03-07T23:12:24.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
99442025-03-07T23:12:24.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
99452025-03-07T23:12:24.285ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99462025-03-07T23:12:24.285ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99472025-03-07T23:12:24.285ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99482025-03-07T23:12:24.285ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99492025-03-07T23:12:24.288ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
99502025-03-07T23:12:24.300ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 4f79228f-8563-45f6-b35f-b99826cfcc94, lookup_type: ByName("default") } result = Ok(())
99512025-03-07T23:12:24.300ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
99522025-03-07T23:12:24.300ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99532025-03-07T23:12:24.300ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99542025-03-07T23:12:24.300ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99552025-03-07T23:12:24.302ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99562025-03-07T23:12:24.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99572025-03-07T23:12:24.306ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99582025-03-07T23:12:24.309ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99592025-03-07T23:12:24.309ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99602025-03-07T23:12:24.316ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99612025-03-07T23:12:24.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99622025-03-07T23:12:24.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99632025-03-07T23:12:24.320ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99642025-03-07T23:12:24.321ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99652025-03-07T23:12:24.321ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99662025-03-07T23:12:24.322ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99672025-03-07T23:12:24.324ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99682025-03-07T23:12:24.325ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99692025-03-07T23:12:24.325ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99702025-03-07T23:12:24.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99712025-03-07T23:12:24.325ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99722025-03-07T23:12:24.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99732025-03-07T23:12:24.325ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99742025-03-07T23:12:24.325ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99752025-03-07T23:12:24.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ByName("default") }
99762025-03-07T23:12:24.329ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project
99772025-03-07T23:12:24.329ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99782025-03-07T23:12:24.330ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99792025-03-07T23:12:24.330ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99802025-03-07T23:12:24.330ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99812025-03-07T23:12:24.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99822025-03-07T23:12:24.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99832025-03-07T23:12:24.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99842025-03-07T23:12:24.331ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
99852025-03-07T23:12:24.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99862025-03-07T23:12:24.331ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99872025-03-07T23:12:24.332ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99882025-03-07T23:12:24.347ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99892025-03-07T23:12:24.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99902025-03-07T23:12:24.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99912025-03-07T23:12:24.348ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99922025-03-07T23:12:24.358ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
99932025-03-07T23:12:24.361ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
99942025-03-07T23:12:24.361ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
99952025-03-07T23:12:24.361ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
99962025-03-07T23:12:24.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99972025-03-07T23:12:24.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99982025-03-07T23:12:24.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
99992025-03-07T23:12:24.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100002025-03-07T23:12:24.383ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100012025-03-07T23:12:24.384ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
100022025-03-07T23:12:24.393ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 2578510b-8473-479a-99f1-532dafdf88b8, lookup_type: ById(2578510b-8473-479a-99f1-532dafdf88b8) }, key: 8da10816-b560-4a3a-b871-ab8d72aaaf74, lookup_type: ByName("default") } result = Ok(())
100032025-03-07T23:12:24.393ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user background_task = vpc_route_manager
100042025-03-07T23:12:24.393ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/vpc-routes
100052025-03-07T23:12:24.394ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34818 req_id = c7d2ea5a-077f-42a1-8b89-9096f787ff34 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
100062025-03-07T23:12:24.395ZINFOtest_unauthorized (dropshot): request completed latency_us = 583 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34818 req_id = c7d2ea5a-077f-42a1-8b89-9096f787ff34 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
100072025-03-07T23:12:24.395ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 204, headers: {"x-request-id": "c7d2ea5a-077f-42a1-8b89-9096f787ff34", "date": "Fri, 07 Mar 2025 23:12:23 GMT"} })
100082025-03-07T23:12:24.396ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 655.416242ms iteration = 5 status = {}
100092025-03-07T23:12:24.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100102025-03-07T23:12:24.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100112025-03-07T23:12:24.399ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100122025-03-07T23:12:24.403ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100132025-03-07T23:12:24.404ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100142025-03-07T23:12:24.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100152025-03-07T23:12:24.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100162025-03-07T23:12:24.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100172025-03-07T23:12:24.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100182025-03-07T23:12:24.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100192025-03-07T23:12:24.409ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100202025-03-07T23:12:24.420ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100212025-03-07T23:12:24.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100222025-03-07T23:12:24.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100232025-03-07T23:12:24.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100242025-03-07T23:12:24.424ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100252025-03-07T23:12:24.424ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100262025-03-07T23:12:24.425ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100272025-03-07T23:12:24.425ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100282025-03-07T23:12:24.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100292025-03-07T23:12:24.437ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100302025-03-07T23:12:24.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100312025-03-07T23:12:24.437ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100322025-03-07T23:12:24.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100332025-03-07T23:12:24.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100342025-03-07T23:12:24.438ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100352025-03-07T23:12:24.441ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100362025-03-07T23:12:24.444ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100372025-03-07T23:12:24.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100382025-03-07T23:12:24.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100392025-03-07T23:12:24.447ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100402025-03-07T23:12:24.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100412025-03-07T23:12:24.447ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100422025-03-07T23:12:24.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100432025-03-07T23:12:24.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100442025-03-07T23:12:24.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100452025-03-07T23:12:24.458ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100462025-03-07T23:12:24.458ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100472025-03-07T23:12:24.458ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100482025-03-07T23:12:24.491ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 276430 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e987856-da3f-4442-9a25-41aa9f29b461 response_code = 201 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
100492025-03-07T23:12:24.491ZINFOtest_unauthorized (external client test context): client received response status = 201
100502025-03-07T23:12:24.491ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
100512025-03-07T23:12:24.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f uri = /v1/anti-affinity-groups?project=demo-project
100522025-03-07T23:12:24.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f uri = /v1/anti-affinity-groups?project=demo-project
100532025-03-07T23:12:24.492ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
100542025-03-07T23:12:24.492ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100552025-03-07T23:12:24.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100562025-03-07T23:12:24.500ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100572025-03-07T23:12:24.500ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100582025-03-07T23:12:24.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100592025-03-07T23:12:24.500ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100602025-03-07T23:12:24.502ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
100612025-03-07T23:12:24.502ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
100622025-03-07T23:12:24.502ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100632025-03-07T23:12:24.502ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100642025-03-07T23:12:24.503ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100652025-03-07T23:12:24.508ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
100662025-03-07T23:12:24.508ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100672025-03-07T23:12:24.509ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100682025-03-07T23:12:24.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100692025-03-07T23:12:24.509ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
100702025-03-07T23:12:24.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
100712025-03-07T23:12:24.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100722025-03-07T23:12:24.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100732025-03-07T23:12:24.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100742025-03-07T23:12:24.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
100752025-03-07T23:12:24.532ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
100762025-03-07T23:12:24.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100772025-03-07T23:12:24.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100782025-03-07T23:12:24.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100792025-03-07T23:12:24.537ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
100802025-03-07T23:12:24.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
100812025-03-07T23:12:24.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
100822025-03-07T23:12:24.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
100832025-03-07T23:12:24.541ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
100842025-03-07T23:12:24.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
100852025-03-07T23:12:24.545ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f uri = /v1/anti-affinity-groups?project=demo-project
100862025-03-07T23:12:24.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
100872025-03-07T23:12:24.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
100882025-03-07T23:12:24.545ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
100892025-03-07T23:12:24.560ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
100902025-03-07T23:12:24.561ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
100912025-03-07T23:12:24.562ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
100922025-03-07T23:12:24.566ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
100932025-03-07T23:12:24.567ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
100942025-03-07T23:12:24.567ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
100952025-03-07T23:12:24.567ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
100962025-03-07T23:12:24.568ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
100972025-03-07T23:12:24.577ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
100982025-03-07T23:12:24.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
100992025-03-07T23:12:24.577ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101002025-03-07T23:12:24.578ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101012025-03-07T23:12:24.583ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
101022025-03-07T23:12:24.584ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
101032025-03-07T23:12:24.584ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101042025-03-07T23:12:24.584ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101052025-03-07T23:12:24.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101062025-03-07T23:12:24.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101072025-03-07T23:12:24.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
101082025-03-07T23:12:24.594ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101092025-03-07T23:12:24.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
101102025-03-07T23:12:24.595ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
101112025-03-07T23:12:24.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
101122025-03-07T23:12:24.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101132025-03-07T23:12:24.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101142025-03-07T23:12:24.598ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101152025-03-07T23:12:24.600ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101162025-03-07T23:12:24.601ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101172025-03-07T23:12:24.601ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
101182025-03-07T23:12:24.601ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
101192025-03-07T23:12:24.601ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
101202025-03-07T23:12:24.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101212025-03-07T23:12:24.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101222025-03-07T23:12:24.603ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
101232025-03-07T23:12:24.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
101242025-03-07T23:12:24.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101252025-03-07T23:12:24.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101262025-03-07T23:12:24.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
101272025-03-07T23:12:24.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101282025-03-07T23:12:24.614ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database uri = /v1/anti-affinity-groups?project=demo-project
101292025-03-07T23:12:24.614ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
101302025-03-07T23:12:24.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
101312025-03-07T23:12:24.748ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 256718 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97ec0b37-bb7b-47e8-bf18-5d130915c43f response_code = 201 uri = /v1/anti-affinity-groups?project=demo-project
101322025-03-07T23:12:24.749ZINFOtest_unauthorized (external client test context): client received response status = 201
101332025-03-07T23:12:24.749ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101342025-03-07T23:12:24.749ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101352025-03-07T23:12:24.750ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101362025-03-07T23:12:24.751ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101372025-03-07T23:12:24.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101382025-03-07T23:12:24.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101392025-03-07T23:12:24.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101402025-03-07T23:12:24.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101412025-03-07T23:12:24.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101422025-03-07T23:12:24.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101432025-03-07T23:12:24.755ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
101442025-03-07T23:12:24.760ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
101452025-03-07T23:12:24.760ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101462025-03-07T23:12:24.760ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101472025-03-07T23:12:24.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101482025-03-07T23:12:24.765ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
101492025-03-07T23:12:24.767ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101502025-03-07T23:12:24.767ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101512025-03-07T23:12:24.767ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101522025-03-07T23:12:24.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
101532025-03-07T23:12:24.784ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
101542025-03-07T23:12:24.785ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101552025-03-07T23:12:24.785ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101562025-03-07T23:12:24.785ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101572025-03-07T23:12:24.790ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
101582025-03-07T23:12:24.790ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
101592025-03-07T23:12:24.790ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101602025-03-07T23:12:24.790ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101612025-03-07T23:12:24.790ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101622025-03-07T23:12:24.801ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
101632025-03-07T23:12:24.802ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101642025-03-07T23:12:24.802ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101652025-03-07T23:12:24.802ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101662025-03-07T23:12:24.811ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
101672025-03-07T23:12:24.813ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
101682025-03-07T23:12:24.813ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101692025-03-07T23:12:24.813ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101702025-03-07T23:12:24.813ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101712025-03-07T23:12:24.815ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101722025-03-07T23:12:24.816ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101732025-03-07T23:12:24.816ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101742025-03-07T23:12:24.816ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101752025-03-07T23:12:24.819ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101762025-03-07T23:12:24.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101772025-03-07T23:12:24.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101782025-03-07T23:12:24.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101792025-03-07T23:12:24.829ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101802025-03-07T23:12:24.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101812025-03-07T23:12:24.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101822025-03-07T23:12:24.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101832025-03-07T23:12:24.855ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101842025-03-07T23:12:24.855ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101852025-03-07T23:12:24.855ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101862025-03-07T23:12:24.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101872025-03-07T23:12:24.861ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101882025-03-07T23:12:24.862ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101892025-03-07T23:12:24.862ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101902025-03-07T23:12:24.862ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101912025-03-07T23:12:24.882ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101922025-03-07T23:12:24.889ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101932025-03-07T23:12:24.890ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101942025-03-07T23:12:24.890ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101952025-03-07T23:12:24.891ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101962025-03-07T23:12:24.891ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101972025-03-07T23:12:24.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101982025-03-07T23:12:24.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
101992025-03-07T23:12:24.894ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102002025-03-07T23:12:24.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102012025-03-07T23:12:24.895ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102022025-03-07T23:12:24.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102032025-03-07T23:12:24.902ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102042025-03-07T23:12:24.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102052025-03-07T23:12:24.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102062025-03-07T23:12:24.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102072025-03-07T23:12:24.904ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102082025-03-07T23:12:24.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102092025-03-07T23:12:24.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102102025-03-07T23:12:24.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102112025-03-07T23:12:24.904ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102122025-03-07T23:12:24.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102132025-03-07T23:12:24.905ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102142025-03-07T23:12:24.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102152025-03-07T23:12:24.913ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102162025-03-07T23:12:24.919ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102172025-03-07T23:12:24.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102182025-03-07T23:12:24.920ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102192025-03-07T23:12:24.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102202025-03-07T23:12:24.920ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102212025-03-07T23:12:24.921ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102222025-03-07T23:12:24.923ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102232025-03-07T23:12:24.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102242025-03-07T23:12:24.936ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102252025-03-07T23:12:24.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102262025-03-07T23:12:24.937ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102272025-03-07T23:12:24.937ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102282025-03-07T23:12:24.937ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102292025-03-07T23:12:24.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102302025-03-07T23:12:24.937ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102312025-03-07T23:12:24.939ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102322025-03-07T23:12:24.941ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102332025-03-07T23:12:24.941ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102342025-03-07T23:12:24.941ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102352025-03-07T23:12:24.963ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 209493 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f0c33098-dc8d-46ce-aa2a-f609222a1bbf response_code = 201 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102362025-03-07T23:12:24.963ZINFOtest_unauthorized (external client test context): client received response status = 201
102372025-03-07T23:12:24.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102382025-03-07T23:12:24.977ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102392025-03-07T23:12:24.977ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102402025-03-07T23:12:24.977ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102412025-03-07T23:12:24.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102422025-03-07T23:12:24.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102432025-03-07T23:12:24.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102442025-03-07T23:12:24.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102452025-03-07T23:12:24.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102462025-03-07T23:12:24.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102472025-03-07T23:12:24.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
102482025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
102492025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102502025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102512025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102522025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
102532025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102542025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102552025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102562025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
102572025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
102582025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102592025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102602025-03-07T23:12:24.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102612025-03-07T23:12:24.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
102622025-03-07T23:12:24.982ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
102632025-03-07T23:12:24.982ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102642025-03-07T23:12:24.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102652025-03-07T23:12:24.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102662025-03-07T23:12:24.982ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
102672025-03-07T23:12:24.982ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102682025-03-07T23:12:24.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102692025-03-07T23:12:24.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102702025-03-07T23:12:24.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
102712025-03-07T23:12:24.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
102722025-03-07T23:12:24.985ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102732025-03-07T23:12:24.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102742025-03-07T23:12:24.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102752025-03-07T23:12:24.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102762025-03-07T23:12:24.989ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102772025-03-07T23:12:24.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102782025-03-07T23:12:24.990ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102792025-03-07T23:12:24.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102802025-03-07T23:12:24.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102812025-03-07T23:12:24.992ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102822025-03-07T23:12:24.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102832025-03-07T23:12:24.995ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102842025-03-07T23:12:24.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102852025-03-07T23:12:24.995ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102862025-03-07T23:12:24.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102872025-03-07T23:12:25.007ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102882025-03-07T23:12:25.007ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102892025-03-07T23:12:25.007ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102902025-03-07T23:12:25.008ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102912025-03-07T23:12:25.023ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102922025-03-07T23:12:25.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102932025-03-07T23:12:25.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102942025-03-07T23:12:25.025ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102952025-03-07T23:12:25.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102962025-03-07T23:12:25.036ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102972025-03-07T23:12:25.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102982025-03-07T23:12:25.037ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
102992025-03-07T23:12:25.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103002025-03-07T23:12:25.045ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103012025-03-07T23:12:25.046ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103022025-03-07T23:12:25.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103032025-03-07T23:12:25.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103042025-03-07T23:12:25.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103052025-03-07T23:12:25.050ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103062025-03-07T23:12:25.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103072025-03-07T23:12:25.053ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103082025-03-07T23:12:25.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103092025-03-07T23:12:25.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103102025-03-07T23:12:25.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103112025-03-07T23:12:25.057ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103122025-03-07T23:12:25.057ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103132025-03-07T23:12:25.058ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103142025-03-07T23:12:25.059ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103152025-03-07T23:12:25.062ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103162025-03-07T23:12:25.062ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103172025-03-07T23:12:25.062ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103182025-03-07T23:12:25.062ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103192025-03-07T23:12:25.065ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103202025-03-07T23:12:25.072ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103212025-03-07T23:12:25.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103222025-03-07T23:12:25.073ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103232025-03-07T23:12:25.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103242025-03-07T23:12:25.073ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103252025-03-07T23:12:25.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103262025-03-07T23:12:25.077ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103272025-03-07T23:12:25.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103282025-03-07T23:12:25.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103292025-03-07T23:12:25.077ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103302025-03-07T23:12:25.080ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103312025-03-07T23:12:25.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103322025-03-07T23:12:25.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103332025-03-07T23:12:25.081ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103342025-03-07T23:12:25.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103352025-03-07T23:12:25.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103362025-03-07T23:12:25.091ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103372025-03-07T23:12:25.091ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103382025-03-07T23:12:25.092ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103392025-03-07T23:12:25.109ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 149463 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 923f9486-e9fa-4735-aece-6280829e0196 response_code = 201 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
103402025-03-07T23:12:25.110ZINFOtest_unauthorized (external client test context): client received response status = 201
103412025-03-07T23:12:25.110ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103422025-03-07T23:12:25.111ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103432025-03-07T23:12:25.111ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103442025-03-07T23:12:25.111ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103452025-03-07T23:12:25.111ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103462025-03-07T23:12:25.114ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103472025-03-07T23:12:25.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103482025-03-07T23:12:25.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103492025-03-07T23:12:25.116ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103502025-03-07T23:12:25.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103512025-03-07T23:12:25.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
103522025-03-07T23:12:25.123ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
103532025-03-07T23:12:25.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103542025-03-07T23:12:25.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103552025-03-07T23:12:25.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103562025-03-07T23:12:25.123ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
103572025-03-07T23:12:25.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103582025-03-07T23:12:25.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103592025-03-07T23:12:25.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103602025-03-07T23:12:25.124ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
103612025-03-07T23:12:25.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
103622025-03-07T23:12:25.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103632025-03-07T23:12:25.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103642025-03-07T23:12:25.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103652025-03-07T23:12:25.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
103662025-03-07T23:12:25.142ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
103672025-03-07T23:12:25.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103682025-03-07T23:12:25.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103692025-03-07T23:12:25.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103702025-03-07T23:12:25.145ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
103712025-03-07T23:12:25.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103722025-03-07T23:12:25.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103732025-03-07T23:12:25.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103742025-03-07T23:12:25.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
103752025-03-07T23:12:25.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
103762025-03-07T23:12:25.156ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103772025-03-07T23:12:25.156ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103782025-03-07T23:12:25.156ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103792025-03-07T23:12:25.156ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103802025-03-07T23:12:25.156ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103812025-03-07T23:12:25.156ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103822025-03-07T23:12:25.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103832025-03-07T23:12:25.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103842025-03-07T23:12:25.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103852025-03-07T23:12:25.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103862025-03-07T23:12:25.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103872025-03-07T23:12:25.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103882025-03-07T23:12:25.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103892025-03-07T23:12:25.163ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103902025-03-07T23:12:25.163ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103912025-03-07T23:12:25.163ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103922025-03-07T23:12:25.163ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103932025-03-07T23:12:25.163ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103942025-03-07T23:12:25.168ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103952025-03-07T23:12:25.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103962025-03-07T23:12:25.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103972025-03-07T23:12:25.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103982025-03-07T23:12:25.177ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
103992025-03-07T23:12:25.177ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104002025-03-07T23:12:25.177ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104012025-03-07T23:12:25.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104022025-03-07T23:12:25.187ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104032025-03-07T23:12:25.199ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104042025-03-07T23:12:25.200ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 88933 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = addcc78f-458d-4162-9be1-a59207a434ff response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
104052025-03-07T23:12:25.200ZINFOtest_unauthorized (external client test context): client received response status = 200
104062025-03-07T23:12:25.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
104072025-03-07T23:12:25.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 uri = /v1/snapshots?project=demo-project
104082025-03-07T23:12:25.201ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 uri = /v1/snapshots?project=demo-project
104092025-03-07T23:12:25.201ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
104102025-03-07T23:12:25.201ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104112025-03-07T23:12:25.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104122025-03-07T23:12:25.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104132025-03-07T23:12:25.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104142025-03-07T23:12:25.205ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104152025-03-07T23:12:25.205ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104162025-03-07T23:12:25.215ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
104172025-03-07T23:12:25.216ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
104182025-03-07T23:12:25.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104192025-03-07T23:12:25.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104202025-03-07T23:12:25.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104212025-03-07T23:12:25.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
104222025-03-07T23:12:25.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
104232025-03-07T23:12:25.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
104242025-03-07T23:12:25.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
104252025-03-07T23:12:25.220ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
104262025-03-07T23:12:25.220ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104272025-03-07T23:12:25.221ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104282025-03-07T23:12:25.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104292025-03-07T23:12:25.224ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
104302025-03-07T23:12:25.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
104312025-03-07T23:12:25.225ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
104322025-03-07T23:12:25.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
104332025-03-07T23:12:25.229ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104342025-03-07T23:12:25.230ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104352025-03-07T23:12:25.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104362025-03-07T23:12:25.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
104372025-03-07T23:12:25.234ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
104382025-03-07T23:12:25.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104392025-03-07T23:12:25.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104402025-03-07T23:12:25.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104412025-03-07T23:12:25.238ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
104422025-03-07T23:12:25.238ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
104432025-03-07T23:12:25.240ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
104442025-03-07T23:12:25.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104452025-03-07T23:12:25.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104462025-03-07T23:12:25.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104472025-03-07T23:12:25.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
104482025-03-07T23:12:25.248ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
104492025-03-07T23:12:25.249ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 uri = /v1/snapshots?project=demo-project
104502025-03-07T23:12:25.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104512025-03-07T23:12:25.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104522025-03-07T23:12:25.249ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104532025-03-07T23:12:25.261ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104542025-03-07T23:12:25.262ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104552025-03-07T23:12:25.262ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104562025-03-07T23:12:25.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
104572025-03-07T23:12:25.266ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
104582025-03-07T23:12:25.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104592025-03-07T23:12:25.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104602025-03-07T23:12:25.266ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104612025-03-07T23:12:25.269ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
104622025-03-07T23:12:25.270ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104632025-03-07T23:12:25.270ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104642025-03-07T23:12:25.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104652025-03-07T23:12:25.272ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
104662025-03-07T23:12:25.272ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104672025-03-07T23:12:25.272ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104682025-03-07T23:12:25.272ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104692025-03-07T23:12:25.275ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
104702025-03-07T23:12:25.285ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
104712025-03-07T23:12:25.286ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104722025-03-07T23:12:25.286ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104732025-03-07T23:12:25.286ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104742025-03-07T23:12:25.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104752025-03-07T23:12:25.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104762025-03-07T23:12:25.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104772025-03-07T23:12:25.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104782025-03-07T23:12:25.299ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104792025-03-07T23:12:25.300ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104802025-03-07T23:12:25.302ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 2 reason = Timeout
104812025-03-07T23:12:25.302ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
104822025-03-07T23:12:25.302ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
104832025-03-07T23:12:25.303ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
104842025-03-07T23:12:25.303ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/snapshots?project=demo-project
104852025-03-07T23:12:25.303ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
104862025-03-07T23:12:25.303ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
104872025-03-07T23:12:25.303ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
104882025-03-07T23:12:25.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
104892025-03-07T23:12:25.305ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = bfd_manager iteration = 2 reason = Timeout
104902025-03-07T23:12:25.306ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
104912025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
104922025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
104932025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 2 reason = Timeout
104942025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 9 reason = Timeout
104952025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 23.56\u{b5}s iteration = 9 status = {"error":"task disabled"}
104962025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 2 reason = Timeout
104972025-03-07T23:12:25.306ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
104982025-03-07T23:12:25.306ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
104992025-03-07T23:12:25.306ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
105002025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
105012025-03-07T23:12:25.306ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
105022025-03-07T23:12:25.315ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
105032025-03-07T23:12:25.315ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
105042025-03-07T23:12:25.316ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
105052025-03-07T23:12:25.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
105062025-03-07T23:12:25.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
105072025-03-07T23:12:25.316ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 2 reason = Timeout
105082025-03-07T23:12:25.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
105092025-03-07T23:12:25.316ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105102025-03-07T23:12:25.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
105112025-03-07T23:12:25.316ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
105122025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
105132025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 3 reason = Timeout
105142025-03-07T23:12:25.317ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
105152025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
105162025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
105172025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 2 reason = Timeout
105182025-03-07T23:12:25.317ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
105192025-03-07T23:12:25.317ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 73.132\u{b5}s iteration = 2 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
105202025-03-07T23:12:25.319ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 2 reason = Timeout
105212025-03-07T23:12:25.319ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
105222025-03-07T23:12:25.319ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105232025-03-07T23:12:25.319ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
105242025-03-07T23:12:25.319ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
105252025-03-07T23:12:25.319ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
105262025-03-07T23:12:25.319ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 6 reason = Timeout
105272025-03-07T23:12:25.319ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
105282025-03-07T23:12:25.319ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
105292025-03-07T23:12:25.319ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105302025-03-07T23:12:25.320ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
105312025-03-07T23:12:25.320ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
105322025-03-07T23:12:25.320ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
105332025-03-07T23:12:25.322ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
105342025-03-07T23:12:25.322ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 75 8b 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 u............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:55454 req_id = e17442e4-378a-4e8a-a2cb-46a733850692
105352025-03-07T23:12:25.322ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30091,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55454 req_id = e17442e4-378a-4e8a-a2cb-46a733850692
105362025-03-07T23:12:25.322ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
105372025-03-07T23:12:25.322ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
105382025-03-07T23:12:25.322ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:55454 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = e17442e4-378a-4e8a-a2cb-46a733850692
105392025-03-07T23:12:25.322ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2830, tv_nsec: 94133419 } })
105402025-03-07T23:12:25.322ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
105412025-03-07T23:12:25.322ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: e4 39 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .9..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:51123 req_id = b8218d48-5703-400c-9104-cca8ad731b92
105422025-03-07T23:12:25.322ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 58425,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51123 req_id = b8218d48-5703-400c-9104-cca8ad731b92
105432025-03-07T23:12:25.322ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
105442025-03-07T23:12:25.323ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
105452025-03-07T23:12:25.323ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:51123 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = b8218d48-5703-400c-9104-cca8ad731b92
105462025-03-07T23:12:25.323ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 13.655337ms iteration = 2 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
105472025-03-07T23:12:25.323ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
105482025-03-07T23:12:25.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
105492025-03-07T23:12:25.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
105502025-03-07T23:12:25.332ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
105512025-03-07T23:12:25.333ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
105522025-03-07T23:12:25.334ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
105532025-03-07T23:12:25.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database uri = /v1/snapshots?project=demo-project
105542025-03-07T23:12:25.337ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
105552025-03-07T23:12:25.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
105562025-03-07T23:12:25.337ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2830, tv_nsec: 113163105 } })
105572025-03-07T23:12:25.337ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
105582025-03-07T23:12:25.337ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
105592025-03-07T23:12:25.337ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
105602025-03-07T23:12:25.343ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
105612025-03-07T23:12:25.343ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
105622025-03-07T23:12:25.344ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
105632025-03-07T23:12:25.344ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
105642025-03-07T23:12:25.344ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 66 87 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e f...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:49200 req_id = 2e4f7297-cfe7-4a35-b73b-1fc69b3eb06e
105652025-03-07T23:12:25.345ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 26247,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49200 req_id = 2e4f7297-cfe7-4a35-b73b-1fc69b3eb06e
105662025-03-07T23:12:25.346ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
105672025-03-07T23:12:25.346ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:49200 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 2e4f7297-cfe7-4a35-b73b-1fc69b3eb06e
105682025-03-07T23:12:25.357ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
105692025-03-07T23:12:25.366ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
105702025-03-07T23:12:25.367ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
105712025-03-07T23:12:25.367ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
105722025-03-07T23:12:25.367ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
105732025-03-07T23:12:25.367ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
105742025-03-07T23:12:25.368ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
105752025-03-07T23:12:25.369ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
105762025-03-07T23:12:25.370ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
105772025-03-07T23:12:25.374ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
105782025-03-07T23:12:25.375ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
105792025-03-07T23:12:25.375ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105802025-03-07T23:12:25.375ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
105812025-03-07T23:12:25.375ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
105822025-03-07T23:12:25.375ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
105832025-03-07T23:12:25.376ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
105842025-03-07T23:12:25.376ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
105852025-03-07T23:12:25.377ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
105862025-03-07T23:12:25.383ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = nat_v4_garbage_collector
105872025-03-07T23:12:25.426ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = nat_v4_garbage_collector zone_address = ::1
105882025-03-07T23:12:25.427ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
105892025-03-07T23:12:25.427ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 4a d4 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e J...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:62043 req_id = df087b8d-5399-47c7-9b53-ffdb110e121e
105902025-03-07T23:12:25.427ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 19156,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62043 req_id = df087b8d-5399-47c7-9b53-ffdb110e121e
105912025-03-07T23:12:25.427ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
105922025-03-07T23:12:25.427ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62043 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = df087b8d-5399-47c7-9b53-ffdb110e121e
105932025-03-07T23:12:25.428ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
105942025-03-07T23:12:25.436ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/snapshots?project=demo-project
105952025-03-07T23:12:25.437ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
105962025-03-07T23:12:25.437ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":23,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[22,0,null],[21,23,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateSnapshotId","name":"snapshot_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDestinationVolumeId","name":"destination_volume_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateLockId","name":"lock_id"}},{"Action":{"action_name":"snapshot_create.take_volume_lock","label":"TakeVolumeLock","name":"volume_lock"}},{"Action":{"action_name":"snapshot_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"snapshot_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"snapshot_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"snapshot_create.create_destination_volume_record","label":"CreateDestinationVolumeRecord","name":"created_destination_volume"}},{"Action":{"action_name":"snapshot_create.create_snapshot_record","label":"CreateSnapshotRecord","name":"created_snapshot"}},{"Action":{"action_name":"snapshot_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"snapshot_create.get_pantry_address","label":"GetPantryAddress","name":"pantry_address"}},{"Action":{"action_name":"snapshot_create.attach_disk_to_pantry","label":"AttachDiskToPantry","name":"disk_generation_number"}},{"Action":{"action_name":"snapshot_create.call_pantry_attach_for_disk","label":"CallPantryAttachForDisk","name":"call_pantry_attach_for_disk"}},{"Action":{"action_name":"snapshot_create.call_pantry_snapshot_for_disk","label":"CallPantrySnapshotForDisk","name":"call_pantry_snapshot_for_disk"}},{"Action":{"action_name":"snapshot_create.call_pantry_detach_for_disk","label":"CallPantryDetachForDisk","name":"call_pantry_detach_for_disk"}},{"Action":{"action_name":"snapshot_create.start_running_snapshot_undo","label":"StartRunningSnapshotUndo","name":"ssc_not_used"}},{"Action":{"action_name":"snapshot_create.start_running_snapshot","label":"StartRunningSnapshot","name":"replace_sockets_map"}},{"Action":{"action_name":"snapshot_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"snapshot_create.finalize_snapshot_record","label":"FinalizeSnapshotRecord","name":"finalized_snapshot"}},{"Action":{"action_name":"snapshot_create.detach_disk_from_pantry","label":"DetachDiskFromPantry","name":"detach_disk_from_pantry"}},{"Action":{"action_name":"snapshot_create.release_volume_lock","label":"ReleaseVolumeLock","name":"volume_unlock"}},{"Start":{"params":{"attach_instance_id":null,"create_params":{"description":"","disk":"demo-disk","name":"demo-snapshot"},"disk_id":"0c4001f0-f776-4e82-98bc-918ec9d357f4","project_id":"12ae9422-28d6-4476-8e2f-3bf8240cdde8","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"silo_id":"001de000-5110-4000-8000-000000000000","use_the_pantry":true}}},"End"]},"saga_name":"snapshot-create","start_node":22} saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
105972025-03-07T23:12:25.437ZINFOtest_unauthorized (SecStore): creating saga saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
105982025-03-07T23:12:25.438ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
105992025-03-07T23:12:25.438ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
106002025-03-07T23:12:25.438ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
106012025-03-07T23:12:25.438ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = bfd_manager
106022025-03-07T23:12:25.482ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = bfd_manager zone_address = ::1
106032025-03-07T23:12:25.482ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
106042025-03-07T23:12:25.526ZTRACtest_unauthorized (BackgroundTasks): checking on VMM background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
106052025-03-07T23:12:25.527ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher body = None method = GET uri = http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
106062025-03-07T23:12:25.527ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
106072025-03-07T23:12:25.527ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
106082025-03-07T23:12:25.527ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
106092025-03-07T23:12:25.527ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
106102025-03-07T23:12:25.529ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
106112025-03-07T23:12:25.529ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
106122025-03-07T23:12:25.532ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
106132025-03-07T23:12:25.533ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
106142025-03-07T23:12:25.533ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
106152025-03-07T23:12:25.533ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
106162025-03-07T23:12:25.534ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
106172025-03-07T23:12:25.534ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
106182025-03-07T23:12:25.534ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34820 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
106192025-03-07T23:12:25.534ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: c1 74 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .t..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:50208 req_id = 0a8e41cf-0fb8-46de-a481-038914e2736b
106202025-03-07T23:12:25.534ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49524,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50208 req_id = 0a8e41cf-0fb8-46de-a481-038914e2736b
106212025-03-07T23:12:25.535ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
106222025-03-07T23:12:25.535ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
106232025-03-07T23:12:25.535ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:50208 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 0a8e41cf-0fb8-46de-a481-038914e2736b
106242025-03-07T23:12:25.536ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34820 req_id = 7d7a4649-d4a7-43ea-ae62-a0987a10a032 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
106252025-03-07T23:12:25.536ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43451, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2830, tv_nsec: 314037663 } })
106262025-03-07T23:12:25.536ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
106272025-03-07T23:12:25.537ZINFOtest_unauthorized (dropshot): request completed latency_us = 835 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34820 req_id = 7d7a4649-d4a7-43ea-ae62-a0987a10a032 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
106282025-03-07T23:12:25.537ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher result = Ok(Response { url: "http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d7a4649-d4a7-43ea-ae62-a0987a10a032", "content-length": "131", "date": "Fri, 07 Mar 2025 23:12:24 GMT"} })
106292025-03-07T23:12:25.538ZDEBGtest_unauthorized (BackgroundTasks): updating instance state background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }, migration_in: None, migration_out: None } vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
106302025-03-07T23:12:25.538ZINFOtest_unauthorized (BackgroundTasks): received new VMM runtime state from sled agent background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }
106312025-03-07T23:12:25.538ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e resource = Database sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
106322025-03-07T23:12:25.538ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e roles = RoleSet { roles: {} } sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
106332025-03-07T23:12:25.538ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e resource = Database result = Ok(()) sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
106342025-03-07T23:12:25.538ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
106352025-03-07T23:12:25.545ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
106362025-03-07T23:12:25.545ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
106372025-03-07T23:12:25.545ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
106382025-03-07T23:12:25.545ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
106392025-03-07T23:12:25.545ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
106402025-03-07T23:12:25.545ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
106412025-03-07T23:12:25.545ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
106422025-03-07T23:12:25.550ZINFOtest_unauthorized (SEC): saga start saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
106432025-03-07T23:12:25.550ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
106442025-03-07T23:12:25.550ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
106452025-03-07T23:12:25.550ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 1b fc 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:51827 req_id = 1fc64b4d-f041-48b1-b43c-c2621815ac02
106462025-03-07T23:12:25.550ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 7164,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51827 req_id = 1fc64b4d-f041-48b1-b43c-c2621815ac02
106472025-03-07T23:12:25.550ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
106482025-03-07T23:12:25.550ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:51827 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 1fc64b4d-f041-48b1-b43c-c2621815ac02
106492025-03-07T23:12:25.550ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc
106502025-03-07T23:12:25.584ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc zone_address = ::1
106512025-03-07T23:12:25.587ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
106522025-03-07T23:12:25.625ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
106532025-03-07T23:12:25.625ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
106542025-03-07T23:12:25.626ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
106552025-03-07T23:12:25.626ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
106562025-03-07T23:12:25.629ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34822 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
106572025-03-07T23:12:25.629ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
106582025-03-07T23:12:25.629ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106592025-03-07T23:12:25.629ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106602025-03-07T23:12:25.629ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106612025-03-07T23:12:25.629ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
106622025-03-07T23:12:25.632ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
106632025-03-07T23:12:25.632ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
106642025-03-07T23:12:25.632ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
106652025-03-07T23:12:25.633ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
106662025-03-07T23:12:25.641ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
106672025-03-07T23:12:25.641ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
106682025-03-07T23:12:25.642ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34822 req_id = 98bd57e4-34fe-4d67-a2ca-ff2c4761f3dd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
106692025-03-07T23:12:25.642ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f33d061e-195b-4a54-a785-b6112fba92fe uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106702025-03-07T23:12:25.643ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f33d061e-195b-4a54-a785-b6112fba92fe resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106712025-03-07T23:12:25.643ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f33d061e-195b-4a54-a785-b6112fba92fe roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106722025-03-07T23:12:25.644ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f33d061e-195b-4a54-a785-b6112fba92fe resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106732025-03-07T23:12:25.645ZINFOtest_unauthorized (dropshot): request completed latency_us = 2417 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34822 req_id = 98bd57e4-34fe-4d67-a2ca-ff2c4761f3dd response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
106742025-03-07T23:12:25.645ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "98bd57e4-34fe-4d67-a2ca-ff2c4761f3dd", "content-length": "212", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
106752025-03-07T23:12:25.645ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
106762025-03-07T23:12:25.645ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
106772025-03-07T23:12:25.647ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
106782025-03-07T23:12:25.683ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106792025-03-07T23:12:25.683ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106802025-03-07T23:12:25.683ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106812025-03-07T23:12:25.683ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106822025-03-07T23:12:25.689ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:41065/v2p
106832025-03-07T23:12:25.694ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
106842025-03-07T23:12:25.694ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
106852025-03-07T23:12:25.694ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34824 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
106862025-03-07T23:12:25.694ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34824 req_id = 7de1d63f-c2cf-4119-92f3-12e9cf3a4e36 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
106872025-03-07T23:12:25.694ZINFOtest_unauthorized (dropshot): request completed latency_us = 200 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34824 req_id = 7de1d63f-c2cf-4119-92f3-12e9cf3a4e36 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
106882025-03-07T23:12:25.694ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:41065/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "7de1d63f-c2cf-4119-92f3-12e9cf3a4e36", "content-length": "102", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
106892025-03-07T23:12:25.694ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(4187191) }} sled = sim-b6d65341
106902025-03-07T23:12:25.694ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
106912025-03-07T23:12:25.695ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
106922025-03-07T23:12:25.695ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 380.941923ms iteration = 3 status = {}
106932025-03-07T23:12:25.695ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 51143 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f33d061e-195b-4a54-a785-b6112fba92fe response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106942025-03-07T23:12:25.697ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "f33d061e-195b-4a54-a785-b6112fba92fe", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
106952025-03-07T23:12:25.697ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
106962025-03-07T23:12:25.697ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0a1a6f22-5fa4-4881-a882-9ab977c14001 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
106972025-03-07T23:12:25.697ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0a1a6f22-5fa4-4881-a882-9ab977c14001 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
106982025-03-07T23:12:25.697ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0a1a6f22-5fa4-4881-a882-9ab977c14001 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
106992025-03-07T23:12:25.697ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0a1a6f22-5fa4-4881-a882-9ab977c14001 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
107002025-03-07T23:12:25.699ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107012025-03-07T23:12:25.700ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("baf11f31-f9c7-45fa-9f16-3a56e0173fed")) node_id = 0 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107022025-03-07T23:12:25.707ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12238 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0a1a6f22-5fa4-4881-a882-9ab977c14001 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
107032025-03-07T23:12:25.709ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a1a6f22-5fa4-4881-a882-9ab977c14001", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
107042025-03-07T23:12:25.709ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
107052025-03-07T23:12:25.709ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107062025-03-07T23:12:25.709ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
107072025-03-07T23:12:25.725ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107082025-03-07T23:12:25.725ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107092025-03-07T23:12:25.727ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {82888c06-1920-48a3-9e72-2ad13a44d89e: {10.0.0.1: {8da10816-b560-4a3a-b871-ab8d72aaaf74}, 10.0.0.0: {8da10816-b560-4a3a-b871-ab8d72aaaf74}}} background_task = vpc_route_manager sled = sim-b6d65341
107102025-03-07T23:12:25.728ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
107112025-03-07T23:12:25.728ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34822 req_id = db4f0458-9f04-4191-9354-cc9271cedf08 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
107122025-03-07T23:12:25.728ZINFOtest_unauthorized (dropshot): request completed latency_us = 306 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34822 req_id = db4f0458-9f04-4191-9354-cc9271cedf08 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
107132025-03-07T23:12:25.728ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "db4f0458-9f04-4191-9354-cc9271cedf08", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
107142025-03-07T23:12:25.728ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
107152025-03-07T23:12:25.728ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
107162025-03-07T23:12:25.729ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
107172025-03-07T23:12:25.751ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
107182025-03-07T23:12:25.751ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
107192025-03-07T23:12:25.754ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
107202025-03-07T23:12:25.756ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
107212025-03-07T23:12:25.756ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
107222025-03-07T23:12:25.756ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
107232025-03-07T23:12:25.756ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107242025-03-07T23:12:25.757ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")) node_id = 1 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107252025-03-07T23:12:25.779ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
107262025-03-07T23:12:25.780ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
107272025-03-07T23:12:25.780ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
107282025-03-07T23:12:25.780ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
107292025-03-07T23:12:25.781ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
107302025-03-07T23:12:25.784ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
107312025-03-07T23:12:25.785ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
107322025-03-07T23:12:25.785ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
107332025-03-07T23:12:25.786ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 1 total_failed = 0 total_incomplete = 0 total_instances = 1 update_sagas_queued = 0
107342025-03-07T23:12:25.787ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 475.295494ms iteration = 2 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{"starting":1},"pruned_instances":0,"total_instances":1,"update_sagas_queued":0}
107352025-03-07T23:12:25.789ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
107362025-03-07T23:12:25.794ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
107372025-03-07T23:12:25.794ZERROtest_unauthorized (BackgroundTasks): ipv6 addresses for service zone nat not implemented background_task = service_zone_nat_tracker
107382025-03-07T23:12:25.795ZERROtest_unauthorized (BackgroundTasks): generated config for fewer than the minimum allowed number of dns zones background_task = service_zone_nat_tracker
107392025-03-07T23:12:25.795ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 489.450773ms iteration = 2 status = {"error":"generated config for fewer than the minimum allowed number of dns zones"}
107402025-03-07T23:12:25.795ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107412025-03-07T23:12:25.795ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107422025-03-07T23:12:25.796ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 push not needed background_task = vpc_route_manager
107432025-03-07T23:12:25.796ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/vpc-routes
107442025-03-07T23:12:25.798ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34822 req_id = c163f4de-9a37-45c0-897b-454cc0fcafcf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
107452025-03-07T23:12:25.798ZINFOtest_unauthorized (dropshot): request completed latency_us = 344 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34822 req_id = c163f4de-9a37-45c0-897b-454cc0fcafcf response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
107462025-03-07T23:12:25.804ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 204, headers: {"x-request-id": "c163f4de-9a37-45c0-897b-454cc0fcafcf", "date": "Fri, 07 Mar 2025 23:12:25 GMT"} })
107472025-03-07T23:12:25.805ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 492.187795ms iteration = 6 status = {}
107482025-03-07T23:12:25.806ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107492025-03-07T23:12:25.808ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("0a311746-8ded-4167-aac5-ff0b2c78506e")) node_id = 2 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107502025-03-07T23:12:25.819ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107512025-03-07T23:12:25.819ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107522025-03-07T23:12:25.839ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107532025-03-07T23:12:25.839ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("e95602f0-8b4e-44f0-9703-3d2d3a7d887d")) node_id = 3 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107542025-03-07T23:12:25.846ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107552025-03-07T23:12:25.846ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107562025-03-07T23:12:25.855ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107572025-03-07T23:12:25.855ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107582025-03-07T23:12:25.856ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107592025-03-07T23:12:25.859ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107602025-03-07T23:12:25.860ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107612025-03-07T23:12:25.860ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107622025-03-07T23:12:25.863ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107632025-03-07T23:12:25.863ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107642025-03-07T23:12:25.864ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107652025-03-07T23:12:25.866ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107662025-03-07T23:12:25.866ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107672025-03-07T23:12:25.866ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107682025-03-07T23:12:25.866ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107692025-03-07T23:12:25.867ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107702025-03-07T23:12:25.870ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107712025-03-07T23:12:25.872ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107722025-03-07T23:12:25.872ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107732025-03-07T23:12:25.872ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107742025-03-07T23:12:25.873ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107752025-03-07T23:12:25.874ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107762025-03-07T23:12:25.874ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107772025-03-07T23:12:25.874ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107782025-03-07T23:12:25.876ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107792025-03-07T23:12:25.884ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107802025-03-07T23:12:25.884ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107812025-03-07T23:12:25.884ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107822025-03-07T23:12:25.884ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = TakeVolumeLock
107832025-03-07T23:12:25.906ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107842025-03-07T23:12:25.906ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107852025-03-07T23:12:25.915ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
107862025-03-07T23:12:25.915ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
107872025-03-07T23:12:25.922ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107882025-03-07T23:12:25.923ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107892025-03-07T23:12:25.923ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107902025-03-07T23:12:25.925ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107912025-03-07T23:12:25.926ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107922025-03-07T23:12:25.926ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107932025-03-07T23:12:25.928ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107942025-03-07T23:12:25.928ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107952025-03-07T23:12:25.928ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107962025-03-07T23:12:25.932ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107972025-03-07T23:12:25.932ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107982025-03-07T23:12:25.933ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
107992025-03-07T23:12:25.933ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108002025-03-07T23:12:25.934ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108012025-03-07T23:12:25.936ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108022025-03-07T23:12:25.937ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108032025-03-07T23:12:25.937ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108042025-03-07T23:12:25.939ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108052025-03-07T23:12:25.943ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108062025-03-07T23:12:25.944ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108072025-03-07T23:12:25.944ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108082025-03-07T23:12:25.945ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108092025-03-07T23:12:25.952ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108102025-03-07T23:12:25.962ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108112025-03-07T23:12:25.963ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108122025-03-07T23:12:25.963ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108132025-03-07T23:12:25.963ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = RegionsAlloc
108142025-03-07T23:12:26.014ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 2520a1a7-480c-468a-a7fd-6a117269f106 (dataset), time_created: 2025-03-07T23:12:04.887848Z, time_modified: 2025-03-07T23:12:04.887848Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: bba3352f-4e07-4bd1-bdf7-5f4138416688, ip: ::1, port: SqlU16(36409), size_used: 4294967296 }, Region { identity: RegionIdentity { id: a65bc9d5-99cd-4c95-b385-2cc44b3a97c8, time_created: 2025-03-07T23:12:25.978027Z, time_modified: 2025-03-07T23:12:25.978027Z }, dataset_id: 2520a1a7-480c-468a-a7fd-6a117269f106 (dataset), volume_id: 0a311746-8ded-4167-aac5-ff0b2c78506e (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: 43459067-35ee-4799-a90e-62fe47e85e2d (dataset), time_created: 2025-03-07T23:12:01.989347Z, time_modified: 2025-03-07T23:12:01.989347Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 15974051-fd8d-4f83-9273-5c6e7019b38e, ip: ::1, port: SqlU16(39323), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 3b630978-4463-4004-8de0-a8b886a99430, time_created: 2025-03-07T23:12:25.978027Z, time_modified: 2025-03-07T23:12:25.978027Z }, dataset_id: 43459067-35ee-4799-a90e-62fe47e85e2d (dataset), volume_id: 0a311746-8ded-4167-aac5-ff0b2c78506e (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), time_created: 2025-03-07T23:12:05.365939Z, time_modified: 2025-03-07T23:12:05.365939Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 25887b79-b28b-4171-99a8-6100028a7952, ip: ::1, port: SqlU16(37937), size_used: 6442450944 }, Region { identity: RegionIdentity { id: 1d2704d1-f3fd-4667-b445-12e1d3edd8b6, time_created: 2025-03-07T23:12:25.978027Z, time_modified: 2025-03-07T23:12:25.978027Z }, dataset_id: e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset), volume_id: 0a311746-8ded-4167-aac5-ff0b2c78506e (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 0a311746-8ded-4167-aac5-ff0b2c78506e
108152025-03-07T23:12:26.015ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108162025-03-07T23:12:26.016ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("a65bc9d5-99cd-4c95-b385-2cc44b3a97c8"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3b630978-4463-4004-8de0-a8b886a99430"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("1d2704d1-f3fd-4667-b445-12e1d3edd8b6"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}]]) node_id = 5 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108172025-03-07T23:12:26.028ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108182025-03-07T23:12:26.029ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108192025-03-07T23:12:26.042ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108202025-03-07T23:12:26.043ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108212025-03-07T23:12:26.048ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108222025-03-07T23:12:26.058ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108232025-03-07T23:12:26.082ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36409 method = POST remote_addr = [::1]:58244 req_id = 2819ed1b-763d-4cf4-8dad-22c734b39d71 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108242025-03-07T23:12:26.085ZINFOtest_unauthorized (SledAgent): created region a65bc9d5-99cd-4c95-b385-2cc44b3a97c8 end_port = 1100 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1050
108252025-03-07T23:12:26.086ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 3081 local_addr = [::1]:36409 method = POST remote_addr = [::1]:58244 req_id = 2819ed1b-763d-4cf4-8dad-22c734b39d71 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108262025-03-07T23:12:26.087ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = 179c2d9e-ff7c-4bc7-b71c-b172d07716e1 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108272025-03-07T23:12:26.089ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 77591c28-fe60-4d60-b44b-d2eabce25b95 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108282025-03-07T23:12:26.089ZINFOtest_unauthorized (SledAgent): created region 3b630978-4463-4004-8de0-a8b886a99430 end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
108292025-03-07T23:12:26.089ZINFOtest_unauthorized (SledAgent): created region 1d2704d1-f3fd-4667-b445-12e1d3edd8b6 end_port = 1150 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1100
108302025-03-07T23:12:26.089ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 828 local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = 179c2d9e-ff7c-4bc7-b71c-b172d07716e1 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108312025-03-07T23:12:26.089ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 630 local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = 77591c28-fe60-4d60-b44b-d2eabce25b95 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108322025-03-07T23:12:26.119ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108332025-03-07T23:12:26.122ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "key": String("fEyAYGmx92Wv4j13L1GpNV3u2tlPz6CUKmC1NfUFqeo="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1051"), String("[::1]:1102"), String("[::1]:1001")]}, "type": String("region")}], "type": String("volume")}) node_id = 7 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108342025-03-07T23:12:26.133ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108352025-03-07T23:12:26.133ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108362025-03-07T23:12:26.182ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108372025-03-07T23:12:26.183ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108382025-03-07T23:12:26.190ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
108392025-03-07T23:12:26.192ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
108402025-03-07T23:12:26.211ZINFOtest_unauthorized (SagaExecutor): grabbing disk by name demo-disk saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
108412025-03-07T23:12:26.211ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108422025-03-07T23:12:26.211ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108432025-03-07T23:12:26.212ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108442025-03-07T23:12:26.218ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108452025-03-07T23:12:26.218ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108462025-03-07T23:12:26.219ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108472025-03-07T23:12:26.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108482025-03-07T23:12:26.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108492025-03-07T23:12:26.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
108502025-03-07T23:12:26.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
108512025-03-07T23:12:26.221ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108522025-03-07T23:12:26.222ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108532025-03-07T23:12:26.222ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108542025-03-07T23:12:26.233ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
108552025-03-07T23:12:26.233ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
108562025-03-07T23:12:26.237ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
108572025-03-07T23:12:26.237ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108582025-03-07T23:12:26.237ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108592025-03-07T23:12:26.238ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108602025-03-07T23:12:26.238ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108612025-03-07T23:12:26.238ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108622025-03-07T23:12:26.239ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108632025-03-07T23:12:26.242ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108642025-03-07T23:12:26.243ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108652025-03-07T23:12:26.243ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108662025-03-07T23:12:26.243ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108672025-03-07T23:12:26.246ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108682025-03-07T23:12:26.246ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108692025-03-07T23:12:26.246ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108702025-03-07T23:12:26.247ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108712025-03-07T23:12:26.251ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108722025-03-07T23:12:26.268ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108732025-03-07T23:12:26.268ZINFOtest_unauthorized (SagaExecutor): creating snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed from disk 0c4001f0-f776-4e82-98bc-918ec9d357f4 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
108742025-03-07T23:12:26.268ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108752025-03-07T23:12:26.268ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108762025-03-07T23:12:26.280ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108772025-03-07T23:12:26.289ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108782025-03-07T23:12:26.289ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108792025-03-07T23:12:26.289ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108802025-03-07T23:12:26.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108812025-03-07T23:12:26.300ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108822025-03-07T23:12:26.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108832025-03-07T23:12:26.301ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108842025-03-07T23:12:26.301ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108852025-03-07T23:12:26.304ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108862025-03-07T23:12:26.304ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108872025-03-07T23:12:26.304ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108882025-03-07T23:12:26.304ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108892025-03-07T23:12:26.311ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108902025-03-07T23:12:26.311ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108912025-03-07T23:12:26.311ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108922025-03-07T23:12:26.311ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108932025-03-07T23:12:26.313ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108942025-03-07T23:12:26.318ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108952025-03-07T23:12:26.318ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108962025-03-07T23:12:26.319ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108972025-03-07T23:12:26.319ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108982025-03-07T23:12:26.319ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
108992025-03-07T23:12:26.319ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109002025-03-07T23:12:26.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
109012025-03-07T23:12:26.322ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109022025-03-07T23:12:26.324ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109032025-03-07T23:12:26.324ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109042025-03-07T23:12:26.324ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109052025-03-07T23:12:26.333ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109062025-03-07T23:12:26.333ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109072025-03-07T23:12:26.338ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109082025-03-07T23:12:26.338ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109092025-03-07T23:12:26.338ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109102025-03-07T23:12:26.344ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109112025-03-07T23:12:26.346ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109122025-03-07T23:12:26.346ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109132025-03-07T23:12:26.346ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateSnapshotRecord
109142025-03-07T23:12:26.457ZINFOtest_unauthorized (SagaExecutor): created snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed ok saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
109152025-03-07T23:12:26.459ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109162025-03-07T23:12:26.459ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}) node_id = 9 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109172025-03-07T23:12:26.479ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109182025-03-07T23:12:26.479ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109192025-03-07T23:12:26.490ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = SpaceAccount
109202025-03-07T23:12:26.491ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = SpaceAccount
109212025-03-07T23:12:26.491ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = SpaceAccount
109222025-03-07T23:12:26.522ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109232025-03-07T23:12:26.523ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109242025-03-07T23:12:26.534ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109252025-03-07T23:12:26.534ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109262025-03-07T23:12:26.546ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109272025-03-07T23:12:26.546ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109282025-03-07T23:12:26.548ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109292025-03-07T23:12:26.553ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109302025-03-07T23:12:26.553ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109312025-03-07T23:12:26.554ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109322025-03-07T23:12:26.556ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109332025-03-07T23:12:26.556ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109342025-03-07T23:12:26.556ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109352025-03-07T23:12:26.560ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109362025-03-07T23:12:26.561ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109372025-03-07T23:12:26.561ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109382025-03-07T23:12:26.561ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109392025-03-07T23:12:26.561ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109402025-03-07T23:12:26.567ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109412025-03-07T23:12:26.568ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109422025-03-07T23:12:26.568ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109432025-03-07T23:12:26.568ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109442025-03-07T23:12:26.575ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109452025-03-07T23:12:26.575ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109462025-03-07T23:12:26.575ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109472025-03-07T23:12:26.576ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109482025-03-07T23:12:26.579ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109492025-03-07T23:12:26.591ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = GetPantryAddress
109502025-03-07T23:12:26.594ZINFOtest_unauthorized (SagaExecutor): using pantry at [::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
109512025-03-07T23:12:26.594ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109522025-03-07T23:12:26.594ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [String("[::1]:39045"), Bool(false)]) node_id = 11 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109532025-03-07T23:12:26.595ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = cd553e88-a3d6-4ffe-a186-10832300f80f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
109542025-03-07T23:12:26.595ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109552025-03-07T23:12:26.595ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109562025-03-07T23:12:26.595ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1257 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = cd553e88-a3d6-4ffe-a186-10832300f80f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
109572025-03-07T23:12:26.595ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109582025-03-07T23:12:26.596ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109592025-03-07T23:12:26.597ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109602025-03-07T23:12:26.597ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
109612025-03-07T23:12:26.601ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
109622025-03-07T23:12:26.601ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
109632025-03-07T23:12:26.613ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109642025-03-07T23:12:26.613ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109652025-03-07T23:12:26.614ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109662025-03-07T23:12:26.618ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109672025-03-07T23:12:26.618ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109682025-03-07T23:12:26.618ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109692025-03-07T23:12:26.633ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109702025-03-07T23:12:26.633ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109712025-03-07T23:12:26.641ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109722025-03-07T23:12:26.641ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109732025-03-07T23:12:26.641ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109742025-03-07T23:12:26.641ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109752025-03-07T23:12:26.641ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109762025-03-07T23:12:26.641ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109772025-03-07T23:12:26.643ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109782025-03-07T23:12:26.643ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109792025-03-07T23:12:26.643ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109802025-03-07T23:12:26.643ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109812025-03-07T23:12:26.649ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109822025-03-07T23:12:26.650ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109832025-03-07T23:12:26.650ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109842025-03-07T23:12:26.650ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109852025-03-07T23:12:26.654ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109862025-03-07T23:12:26.663ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109872025-03-07T23:12:26.663ZINFOtest_unauthorized (SagaExecutor): setting state of 0c4001f0-f776-4e82-98bc-918ec9d357f4 to maintenance saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
109882025-03-07T23:12:26.663ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109892025-03-07T23:12:26.663ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109902025-03-07T23:12:26.663ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109912025-03-07T23:12:26.663ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109922025-03-07T23:12:26.664ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109932025-03-07T23:12:26.675ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109942025-03-07T23:12:26.675ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109952025-03-07T23:12:26.675ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109962025-03-07T23:12:26.676ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109972025-03-07T23:12:26.680ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109982025-03-07T23:12:26.683ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
109992025-03-07T23:12:26.683ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110002025-03-07T23:12:26.683ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110012025-03-07T23:12:26.688ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110022025-03-07T23:12:26.696ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110032025-03-07T23:12:26.696ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110042025-03-07T23:12:26.696ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110052025-03-07T23:12:26.698ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110062025-03-07T23:12:26.718ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110072025-03-07T23:12:26.719ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110082025-03-07T23:12:26.719ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110092025-03-07T23:12:26.729ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110102025-03-07T23:12:26.730ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110112025-03-07T23:12:26.730ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110122025-03-07T23:12:26.732ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110132025-03-07T23:12:26.734ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110142025-03-07T23:12:26.735ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110152025-03-07T23:12:26.741ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110162025-03-07T23:12:26.743ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110172025-03-07T23:12:26.744ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110182025-03-07T23:12:26.744ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110192025-03-07T23:12:26.744ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110202025-03-07T23:12:26.748ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110212025-03-07T23:12:26.748ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110222025-03-07T23:12:26.748ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110232025-03-07T23:12:26.749ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110242025-03-07T23:12:26.752ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110252025-03-07T23:12:26.753ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110262025-03-07T23:12:26.754ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110272025-03-07T23:12:26.754ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110282025-03-07T23:12:26.759ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110292025-03-07T23:12:26.778ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = AttachDiskToPantry
110302025-03-07T23:12:26.780ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
110312025-03-07T23:12:26.780ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Number(3)) node_id = 12 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
110322025-03-07T23:12:26.790ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
110332025-03-07T23:12:26.790ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
110342025-03-07T23:12:26.821ZINFOtest_unauthorized (SagaExecutor): attaching disk 0c4001f0-f776-4e82-98bc-918ec9d357f4 to pantry at [::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
110352025-03-07T23:12:26.824ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110362025-03-07T23:12:26.824ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110372025-03-07T23:12:26.824ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110382025-03-07T23:12:26.836ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110392025-03-07T23:12:26.837ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110402025-03-07T23:12:26.837ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110412025-03-07T23:12:26.849ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110422025-03-07T23:12:26.849ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110432025-03-07T23:12:26.851ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110442025-03-07T23:12:26.872ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110452025-03-07T23:12:26.873ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110462025-03-07T23:12:26.873ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110472025-03-07T23:12:26.873ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110482025-03-07T23:12:26.873ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110492025-03-07T23:12:26.876ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110502025-03-07T23:12:26.876ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110512025-03-07T23:12:26.877ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110522025-03-07T23:12:26.877ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110532025-03-07T23:12:26.880ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110542025-03-07T23:12:26.882ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110552025-03-07T23:12:26.882ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110562025-03-07T23:12:26.884ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110572025-03-07T23:12:26.885ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110582025-03-07T23:12:26.892ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110592025-03-07T23:12:26.911ZINFOtest_unauthorized (SagaExecutor): sending attach request for 0c4001f0-f776-4e82-98bc-918ec9d357f4 to [::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
110602025-03-07T23:12:26.956ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
110612025-03-07T23:12:26.957ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 96 8c 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:64625 req_id = 82bb6964-fdbc-4ee7-a678-db8099b3939a
110622025-03-07T23:12:26.957ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 38540,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64625 req_id = 82bb6964-fdbc-4ee7-a678-db8099b3939a
110632025-03-07T23:12:26.958ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
110642025-03-07T23:12:26.960ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
110652025-03-07T23:12:26.961ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:64625 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = 82bb6964-fdbc-4ee7-a678-db8099b3939a
110662025-03-07T23:12:26.961ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2831, tv_nsec: 735874361 } })
110672025-03-07T23:12:26.961ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
110682025-03-07T23:12:26.961ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: e3 e2 01 00 00 01 00 00 00 00 00 01 24 30 65 36 ............$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:63674 req_id = a99527bc-e0f4-4b6c-b7b6-4bb595a397f0
110692025-03-07T23:12:26.961ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 58338,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63674 req_id = a99527bc-e0f4-4b6c-b7b6-4bb595a397f0
110702025-03-07T23:12:26.961ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
110712025-03-07T23:12:26.961ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:63674 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = a99527bc-e0f4-4b6c-b7b6-4bb595a397f0
110722025-03-07T23:12:26.961ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54076 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
110732025-03-07T23:12:26.961ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = POST remote_addr = [::1]:54076 req_id = 28ec1d33-8374-47c6-9415-b09a95c09ad3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4
110742025-03-07T23:12:26.972ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 11680 local_addr = [::1]:39045 method = POST remote_addr = [::1]:54076 req_id = 28ec1d33-8374-47c6-9415-b09a95c09ad3 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4
110752025-03-07T23:12:26.975ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
110762025-03-07T23:12:26.976ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
110772025-03-07T23:12:26.985ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
110782025-03-07T23:12:26.986ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
110792025-03-07T23:12:26.992ZINFOtest_unauthorized (SagaExecutor): sending snapshot request with id baf11f31-f9c7-45fa-9f16-3a56e0173fed for disk 0c4001f0-f776-4e82-98bc-918ec9d357f4 to pantry endpoint http://[::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
110802025-03-07T23:12:27.034ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
110812025-03-07T23:12:27.035ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: d7 25 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .%..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:49992 req_id = bf9a43a3-77e2-44c6-8635-22abfd0a0e35
110822025-03-07T23:12:27.036ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 55077,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49992 req_id = bf9a43a3-77e2-44c6-8635-22abfd0a0e35
110832025-03-07T23:12:27.036ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
110842025-03-07T23:12:27.037ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
110852025-03-07T23:12:27.037ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:49992 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = bf9a43a3-77e2-44c6-8635-22abfd0a0e35
110862025-03-07T23:12:27.037ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2831, tv_nsec: 814895092 } })
110872025-03-07T23:12:27.038ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
110882025-03-07T23:12:27.040ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 38 5e 01 00 00 01 00 00 00 00 00 01 24 30 65 36 8^..........$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:63410 req_id = 5d284afd-acc3-43f4-9645-e4fb4fa769e2
110892025-03-07T23:12:27.041ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 14430,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63410 req_id = 5d284afd-acc3-43f4-9645-e4fb4fa769e2
110902025-03-07T23:12:27.041ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
110912025-03-07T23:12:27.041ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:63410 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 5d284afd-acc3-43f4-9645-e4fb4fa769e2
110922025-03-07T23:12:27.041ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54078 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
110932025-03-07T23:12:27.042ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = POST remote_addr = [::1]:54078 req_id = 1284ae5e-51af-4048-8d50-3240501930c6 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4/snapshot
110942025-03-07T23:12:27.042ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): mapped vcr with id 0c4001f0-f776-4e82-98bc-918ec9d357f4
110952025-03-07T23:12:27.042ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = babce11f-67c0-4261-ba5b-b14299523d56 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = baf11f31-f9c7-45fa-9f16-3a56e0173fed
110962025-03-07T23:12:27.042ZINFOtest_unauthorized (SledAgent): creating region babce11f-67c0-4261-ba5b-b14299523d56 snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
110972025-03-07T23:12:27.042ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = 3a28c948-fca0-41b0-907e-b586cafc1227 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = baf11f31-f9c7-45fa-9f16-3a56e0173fed
110982025-03-07T23:12:27.042ZINFOtest_unauthorized (SledAgent): creating region 3a28c948-fca0-41b0-907e-b586cafc1227 snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed end_port = 1150 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1100
110992025-03-07T23:12:27.042ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = 8616586f-ac3f-42eb-9093-dcb9c7174450 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = baf11f31-f9c7-45fa-9f16-3a56e0173fed
111002025-03-07T23:12:27.042ZINFOtest_unauthorized (SledAgent): creating region 8616586f-ac3f-42eb-9093-dcb9c7174450 snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
111012025-03-07T23:12:27.042ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): successfully created snapshot baf11f31-f9c7-45fa-9f16-3a56e0173fed
111022025-03-07T23:12:27.043ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 479 local_addr = [::1]:39045 method = POST remote_addr = [::1]:54078 req_id = 1284ae5e-51af-4048-8d50-3240501930c6 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4/snapshot
111032025-03-07T23:12:27.044ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111042025-03-07T23:12:27.044ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111052025-03-07T23:12:27.058ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111062025-03-07T23:12:27.060ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111072025-03-07T23:12:27.067ZINFOtest_unauthorized (SagaExecutor): detaching disk 0c4001f0-f776-4e82-98bc-918ec9d357f4 from pantry at [::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111082025-03-07T23:12:27.067ZINFOtest_unauthorized (SagaExecutor): sending detach for 0c4001f0-f776-4e82-98bc-918ec9d357f4 to endpoint http://[::1]:39045 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111092025-03-07T23:12:27.116ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
111102025-03-07T23:12:27.125ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 61 02 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 a............_cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:59011 req_id = 8ff797b7-53f9-4fa1-802f-e97402ad017f
111112025-03-07T23:12:27.134ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 24834,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59011 req_id = 8ff797b7-53f9-4fa1-802f-e97402ad017f
111122025-03-07T23:12:27.134ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
111132025-03-07T23:12:27.134ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
111142025-03-07T23:12:27.135ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:59011 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = 8ff797b7-53f9-4fa1-802f-e97402ad017f
111152025-03-07T23:12:27.136ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2831, tv_nsec: 895484663 } })
111162025-03-07T23:12:27.136ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
111172025-03-07T23:12:27.136ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 70 56 01 00 00 01 00 00 00 00 00 01 24 30 65 36 pV..........$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:60778 req_id = 128fd259-db8c-4f63-94e0-97487a9418d6
111182025-03-07T23:12:27.136ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 28758,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60778 req_id = 128fd259-db8c-4f63-94e0-97487a9418d6
111192025-03-07T23:12:27.136ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
111202025-03-07T23:12:27.136ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60778 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 128fd259-db8c-4f63-94e0-97487a9418d6
111212025-03-07T23:12:27.136ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54080 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
111222025-03-07T23:12:27.136ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = DELETE remote_addr = [::1]:54080 req_id = 7d54d063-aa79-410c-a272-1a107ab12da4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4
111232025-03-07T23:12:27.136ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 189 local_addr = [::1]:39045 method = DELETE remote_addr = [::1]:54080 req_id = 7d54d063-aa79-410c-a272-1a107ab12da4 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/0c4001f0-f776-4e82-98bc-918ec9d357f4
111242025-03-07T23:12:27.136ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111252025-03-07T23:12:27.136ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 15 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111262025-03-07T23:12:27.170ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111272025-03-07T23:12:27.170ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111282025-03-07T23:12:27.179ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111292025-03-07T23:12:27.179ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111302025-03-07T23:12:27.194ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
111312025-03-07T23:12:27.207ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
111322025-03-07T23:12:27.207ZINFOtest_unauthorized (SagaExecutor): starting running snapshot saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot_id = baf11f31-f9c7-45fa-9f16-3a56e0173fed
111332025-03-07T23:12:27.207ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111342025-03-07T23:12:27.207ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111352025-03-07T23:12:27.208ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111362025-03-07T23:12:27.210ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111372025-03-07T23:12:27.216ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111382025-03-07T23:12:27.216ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111392025-03-07T23:12:27.216ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111402025-03-07T23:12:27.216ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111412025-03-07T23:12:27.217ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111422025-03-07T23:12:27.217ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111432025-03-07T23:12:27.217ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111442025-03-07T23:12:27.217ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111452025-03-07T23:12:27.217ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111462025-03-07T23:12:27.219ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111472025-03-07T23:12:27.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
111482025-03-07T23:12:27.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
111492025-03-07T23:12:27.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
111502025-03-07T23:12:27.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
111512025-03-07T23:12:27.223ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111522025-03-07T23:12:27.225ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111532025-03-07T23:12:27.225ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111542025-03-07T23:12:27.225ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111552025-03-07T23:12:27.225ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
111562025-03-07T23:12:27.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
111572025-03-07T23:12:27.227ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111582025-03-07T23:12:27.228ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111592025-03-07T23:12:27.228ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111602025-03-07T23:12:27.228ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111612025-03-07T23:12:27.229ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
111622025-03-07T23:12:27.231ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
111632025-03-07T23:12:27.233ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111642025-03-07T23:12:27.243ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = StartRunningSnapshot
111652025-03-07T23:12:27.247ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = 43459067-35ee-4799-a90e-62fe47e85e2d (dataset) region = babce11f-67c0-4261-ba5b-b14299523d56 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111662025-03-07T23:12:27.252ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:39323 method = GET remote_addr = [::1]:51812 req_id = 5c7844ba-153d-42b7-ab75-9d46c1fe2886 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56
111672025-03-07T23:12:27.257ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 426 local_addr = [::1]:39323 method = GET remote_addr = [::1]:51812 req_id = 5c7844ba-153d-42b7-ab75-9d46c1fe2886 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56
111682025-03-07T23:12:27.257ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = 43459067-35ee-4799-a90e-62fe47e85e2d (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("babce11f-67c0-4261-ba5b-b14299523d56"), key_pem: None, port_number: 1000, read_only: false, root_pem: None, source: None, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111692025-03-07T23:12:27.257ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = 43459067-35ee-4799-a90e-62fe47e85e2d (dataset) region = babce11f-67c0-4261-ba5b-b14299523d56 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = baf11f31-f9c7-45fa-9f16-3a56e0173fed
111702025-03-07T23:12:27.257ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:39323 method = GET remote_addr = [::1]:51812 req_id = 1ac8316b-a252-48a2-9e3e-6c4d59d4a4ab server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111712025-03-07T23:12:27.257ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 292 local_addr = [::1]:39323 method = GET remote_addr = [::1]:51812 req_id = 1ac8316b-a252-48a2-9e3e-6c4d59d4a4ab response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111722025-03-07T23:12:27.258ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = 43459067-35ee-4799-a90e-62fe47e85e2d (dataset) region = RegionId("babce11f-67c0-4261-ba5b-b14299523d56") saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:12:27.042336877Z, name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed" }
111732025-03-07T23:12:27.262ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = bf41fde0-783e-4628-b8a8-5344bab190ac server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
111742025-03-07T23:12:27.262ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 265 local_addr = [::1]:39323 method = POST remote_addr = [::1]:51812 req_id = bf41fde0-783e-4628-b8a8-5344bab190ac response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/babce11f-67c0-4261-ba5b-b14299523d56/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
111752025-03-07T23:12:27.263ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("1505f3fb-2e5c-4b1a-9840-b6e7ae993f98"), name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed", port_number: 1002, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111762025-03-07T23:12:27.263ZINFOtest_unauthorized (SagaExecutor): map [::1]:1000 to [::1]:1002 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111772025-03-07T23:12:27.278ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset) region = 8616586f-ac3f-42eb-9093-dcb9c7174450 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111782025-03-07T23:12:27.283ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:40767 method = GET remote_addr = [::1]:34584 req_id = 1922ebee-e98f-4b45-a341-f9b39524d4c5 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450
111792025-03-07T23:12:27.285ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 268 local_addr = [::1]:40767 method = GET remote_addr = [::1]:34584 req_id = 1922ebee-e98f-4b45-a341-f9b39524d4c5 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450
111802025-03-07T23:12:27.285ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("8616586f-ac3f-42eb-9093-dcb9c7174450"), key_pem: None, port_number: 1150, read_only: false, root_pem: None, source: None, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111812025-03-07T23:12:27.285ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset) region = 8616586f-ac3f-42eb-9093-dcb9c7174450 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = baf11f31-f9c7-45fa-9f16-3a56e0173fed
111822025-03-07T23:12:27.291ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:40767 method = GET remote_addr = [::1]:34584 req_id = 41500381-88db-4f32-898d-5278d30d4cd3 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111832025-03-07T23:12:27.293ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 270 local_addr = [::1]:40767 method = GET remote_addr = [::1]:34584 req_id = 41500381-88db-4f32-898d-5278d30d4cd3 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111842025-03-07T23:12:27.293ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = dfafd922-ff6f-46aa-896b-3058e64f8ce4 (dataset) region = RegionId("8616586f-ac3f-42eb-9093-dcb9c7174450") saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:12:27.042433859Z, name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed" }
111852025-03-07T23:12:27.297ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = c6dd4d16-d1f6-4516-a1f7-2c49a4c8e809 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
111862025-03-07T23:12:27.297ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 361 local_addr = [::1]:40767 method = POST remote_addr = [::1]:34584 req_id = c6dd4d16-d1f6-4516-a1f7-2c49a4c8e809 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/8616586f-ac3f-42eb-9093-dcb9c7174450/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
111872025-03-07T23:12:27.297ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("4953959a-0af2-48db-8a07-d43ed1528524"), name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed", port_number: 1152, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111882025-03-07T23:12:27.297ZINFOtest_unauthorized (SagaExecutor): map [::1]:1150 to [::1]:1152 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111892025-03-07T23:12:27.313ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset) region = 3a28c948-fca0-41b0-907e-b586cafc1227 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111902025-03-07T23:12:27.319ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
111912025-03-07T23:12:27.320ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = GET remote_addr = [::1]:52910 req_id = b8c11beb-d964-43e8-9df3-0d307169882c server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227
111922025-03-07T23:12:27.320ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 363 local_addr = [::1]:37937 method = GET remote_addr = [::1]:52910 req_id = b8c11beb-d964-43e8-9df3-0d307169882c response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227
111932025-03-07T23:12:27.321ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("3a28c948-fca0-41b0-907e-b586cafc1227"), key_pem: None, port_number: 1100, read_only: false, root_pem: None, source: None, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
111942025-03-07T23:12:27.322ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset) region = 3a28c948-fca0-41b0-907e-b586cafc1227 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = baf11f31-f9c7-45fa-9f16-3a56e0173fed
111952025-03-07T23:12:27.325ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = GET remote_addr = [::1]:52910 req_id = e7b14a8d-979e-47b5-92da-b49d39e51fe6 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111962025-03-07T23:12:27.325ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 380 local_addr = [::1]:37937 method = GET remote_addr = [::1]:52910 req_id = e7b14a8d-979e-47b5-92da-b49d39e51fe6 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed
111972025-03-07T23:12:27.326ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = e20f8d49-ae5b-43bb-9784-7ca159b3f1f2 (dataset) region = RegionId("3a28c948-fca0-41b0-907e-b586cafc1227") saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:12:27.042412699Z, name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed" }
111982025-03-07T23:12:27.329ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = a9dd550a-4f89-48e8-b2c1-4f92e637531f server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
111992025-03-07T23:12:27.331ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 260 local_addr = [::1]:37937 method = POST remote_addr = [::1]:52910 req_id = a9dd550a-4f89-48e8-b2c1-4f92e637531f response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/3a28c948-fca0-41b0-907e-b586cafc1227/snapshots/baf11f31-f9c7-45fa-9f16-3a56e0173fed/run
112002025-03-07T23:12:27.331ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("eb76ed37-971b-4bb5-944c-b0049b676844"), name: "baf11f31-f9c7-45fa-9f16-3a56e0173fed", port_number: 1103, state: Created } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112012025-03-07T23:12:27.331ZINFOtest_unauthorized (SagaExecutor): map [::1]:1100 to [::1]:1103 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112022025-03-07T23:12:27.344ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
112032025-03-07T23:12:27.345ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"[::1]:1000": String("[::1]:1002"), "[::1]:1100": String("[::1]:1103"), "[::1]:1150": String("[::1]:1152")}) node_id = 17 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
112042025-03-07T23:12:27.352ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
112052025-03-07T23:12:27.352ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
112062025-03-07T23:12:27.367ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112072025-03-07T23:12:27.367ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112082025-03-07T23:12:27.367ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112092025-03-07T23:12:27.378ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112102025-03-07T23:12:27.380ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112112025-03-07T23:12:27.380ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112122025-03-07T23:12:27.383ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112132025-03-07T23:12:27.383ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112142025-03-07T23:12:27.384ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112152025-03-07T23:12:27.386ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112162025-03-07T23:12:27.387ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112172025-03-07T23:12:27.387ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112182025-03-07T23:12:27.387ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112192025-03-07T23:12:27.387ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112202025-03-07T23:12:27.391ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112212025-03-07T23:12:27.394ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112222025-03-07T23:12:27.394ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112232025-03-07T23:12:27.395ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112242025-03-07T23:12:27.395ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112252025-03-07T23:12:27.395ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112262025-03-07T23:12:27.395ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112272025-03-07T23:12:27.395ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112282025-03-07T23:12:27.397ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112292025-03-07T23:12:27.405ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = CreateVolumeRecord
112302025-03-07T23:12:27.424ZINFOtest_unauthorized (SagaExecutor): disk volume construction request {"type":"volume","id":"0c4001f0-f776-4e82-98bc-918ec9d357f4","block_size":4096,"sub_volumes":[{"type":"region","block_size":4096,"blocks_per_extent":16384,"extent_count":32,"opts":{"id":"0c4001f0-f776-4e82-98bc-918ec9d357f4","target":["[::1]:1000","[::1]:1100","[::1]:1150"],"lossy":false,"flush_timeout":null,"key":"DhZKipAjez5HFrN0ZUGH5KJlCxVxcyH4wZcUiSVb/4U=","cert_pem":null,"key_pem":null,"root_cert_pem":null,"control":null,"read_only":false},"gen":2}],"read_only_parent":null} saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112312025-03-07T23:12:27.425ZINFOtest_unauthorized (SagaExecutor): snapshot volume construction request Volume { id: 66edd1b7-246e-475e-aa0f-02b9c1e19567, block_size: 4096, sub_volumes: [Region { block_size: 4096, blocks_per_extent: 16384, extent_count: 32, opts: CrucibleOpts { id: 8bf89d5c-e713-4317-9b9a-10ea6ee3e8f0, target: [[::1]:1002, [::1]:1103, [::1]:1152], lossy: false, flush_timeout: None, key: Some("DhZKipAjez5HFrN0ZUGH5KJlCxVxcyH4wZcUiSVb/4U="), cert_pem: None, key_pem: None, root_cert_pem: None, control: None, read_only: true }, gen: 2 }], read_only_parent: None } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112322025-03-07T23:12:27.439ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
112332025-03-07T23:12:27.439ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
112342025-03-07T23:12:27.439ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
112352025-03-07T23:12:27.535ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
112362025-03-07T23:12:27.536ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
112372025-03-07T23:12:27.536ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
112382025-03-07T23:12:27.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
112392025-03-07T23:12:27.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112402025-03-07T23:12:27.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8d04a9e1-7c44-4820-acff-3c2fc88bfed9 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112412025-03-07T23:12:27.575ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8d04a9e1-7c44-4820-acff-3c2fc88bfed9 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112422025-03-07T23:12:27.575ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8d04a9e1-7c44-4820-acff-3c2fc88bfed9 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112432025-03-07T23:12:27.575ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8d04a9e1-7c44-4820-acff-3c2fc88bfed9 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112442025-03-07T23:12:27.580ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4960 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8d04a9e1-7c44-4820-acff-3c2fc88bfed9 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112452025-03-07T23:12:27.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "8d04a9e1-7c44-4820-acff-3c2fc88bfed9", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:26 GMT"} })
112462025-03-07T23:12:27.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112472025-03-07T23:12:27.580ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 75dc7fad-97cd-4d22-94d8-0e6b1b4ee634 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112482025-03-07T23:12:27.580ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 75dc7fad-97cd-4d22-94d8-0e6b1b4ee634 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112492025-03-07T23:12:27.581ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 75dc7fad-97cd-4d22-94d8-0e6b1b4ee634 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112502025-03-07T23:12:27.581ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 75dc7fad-97cd-4d22-94d8-0e6b1b4ee634 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112512025-03-07T23:12:27.582ZINFOtest_unauthorized (SagaExecutor): volume 28d7d230-58b2-49ea-8b5f-b2820b87c7e5 created ok saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112522025-03-07T23:12:27.583ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
112532025-03-07T23:12:27.583ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
112542025-03-07T23:12:27.583ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3896 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 75dc7fad-97cd-4d22-94d8-0e6b1b4ee634 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
112552025-03-07T23:12:27.584ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "75dc7fad-97cd-4d22-94d8-0e6b1b4ee634", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:26 GMT"} })
112562025-03-07T23:12:27.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112572025-03-07T23:12:27.584ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
112582025-03-07T23:12:27.584ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
112592025-03-07T23:12:27.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112602025-03-07T23:12:27.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112612025-03-07T23:12:27.589ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112622025-03-07T23:12:27.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112632025-03-07T23:12:27.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112642025-03-07T23:12:27.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
112652025-03-07T23:12:27.595ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
112662025-03-07T23:12:27.595ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
112672025-03-07T23:12:27.628ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
112682025-03-07T23:12:27.628ZINFOtest_unauthorized (SagaExecutor): snapshot final lookup... saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112692025-03-07T23:12:27.628ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112702025-03-07T23:12:27.629ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112712025-03-07T23:12:27.629ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112722025-03-07T23:12:27.631ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
112732025-03-07T23:12:27.631ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
112742025-03-07T23:12:27.633ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112752025-03-07T23:12:27.639ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112762025-03-07T23:12:27.639ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112772025-03-07T23:12:27.641ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112782025-03-07T23:12:27.641ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112792025-03-07T23:12:27.644ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112802025-03-07T23:12:27.647ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ById(baf11f31-f9c7-45fa-9f16-3a56e0173fed) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112812025-03-07T23:12:27.648ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112822025-03-07T23:12:27.648ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112832025-03-07T23:12:27.648ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112842025-03-07T23:12:27.648ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112852025-03-07T23:12:27.650ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112862025-03-07T23:12:27.652ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112872025-03-07T23:12:27.652ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112882025-03-07T23:12:27.652ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112892025-03-07T23:12:27.655ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112902025-03-07T23:12:27.655ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112912025-03-07T23:12:27.656ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112922025-03-07T23:12:27.656ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112932025-03-07T23:12:27.659ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112942025-03-07T23:12:27.667ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ById(baf11f31-f9c7-45fa-9f16-3a56e0173fed) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112952025-03-07T23:12:27.667ZINFOtest_unauthorized (SagaExecutor): snapshot final lookup ok saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
112962025-03-07T23:12:27.667ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ById(baf11f31-f9c7-45fa-9f16-3a56e0173fed) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112972025-03-07T23:12:27.667ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112982025-03-07T23:12:27.667ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
112992025-03-07T23:12:27.667ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113002025-03-07T23:12:27.668ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113012025-03-07T23:12:27.672ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113022025-03-07T23:12:27.678ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113032025-03-07T23:12:27.678ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113042025-03-07T23:12:27.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113052025-03-07T23:12:27.679ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113062025-03-07T23:12:27.679ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113072025-03-07T23:12:27.679ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113082025-03-07T23:12:27.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113092025-03-07T23:12:27.680ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113102025-03-07T23:12:27.699ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ById(baf11f31-f9c7-45fa-9f16-3a56e0173fed) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113112025-03-07T23:12:27.700ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113122025-03-07T23:12:27.700ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113132025-03-07T23:12:27.701ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113142025-03-07T23:12:27.712ZINFOtest_unauthorized (SagaExecutor): snapshot finalized! saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
113152025-03-07T23:12:27.714ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113162025-03-07T23:12:27.714ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}) node_id = 19 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113172025-03-07T23:12:27.724ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113182025-03-07T23:12:27.725ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113192025-03-07T23:12:27.731ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113202025-03-07T23:12:27.732ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113212025-03-07T23:12:27.733ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113222025-03-07T23:12:27.734ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113232025-03-07T23:12:27.736ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113242025-03-07T23:12:27.736ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113252025-03-07T23:12:27.737ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113262025-03-07T23:12:27.738ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113272025-03-07T23:12:27.738ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113282025-03-07T23:12:27.741ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113292025-03-07T23:12:27.741ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113302025-03-07T23:12:27.741ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113312025-03-07T23:12:27.741ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113322025-03-07T23:12:27.742ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113332025-03-07T23:12:27.745ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113342025-03-07T23:12:27.745ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113352025-03-07T23:12:27.745ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113362025-03-07T23:12:27.746ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113372025-03-07T23:12:27.749ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113382025-03-07T23:12:27.750ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113392025-03-07T23:12:27.750ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113402025-03-07T23:12:27.750ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113412025-03-07T23:12:27.757ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113422025-03-07T23:12:27.764ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113432025-03-07T23:12:27.765ZINFOtest_unauthorized (SagaExecutor): setting disk 0c4001f0-f776-4e82-98bc-918ec9d357f4 state from maintenance to detached saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create
113442025-03-07T23:12:27.765ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113452025-03-07T23:12:27.766ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113462025-03-07T23:12:27.766ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113472025-03-07T23:12:27.766ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113482025-03-07T23:12:27.766ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113492025-03-07T23:12:27.780ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113502025-03-07T23:12:27.780ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113512025-03-07T23:12:27.780ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113522025-03-07T23:12:27.787ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113532025-03-07T23:12:27.788ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113542025-03-07T23:12:27.788ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113552025-03-07T23:12:27.788ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113562025-03-07T23:12:27.789ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113572025-03-07T23:12:27.796ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113582025-03-07T23:12:27.802ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113592025-03-07T23:12:27.810ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113602025-03-07T23:12:27.810ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113612025-03-07T23:12:27.810ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = DetachDiskFromPantry
113622025-03-07T23:12:27.828ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113632025-03-07T23:12:27.829ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113642025-03-07T23:12:27.834ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113652025-03-07T23:12:27.834ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113662025-03-07T23:12:27.843ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113672025-03-07T23:12:27.843ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113682025-03-07T23:12:27.844ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113692025-03-07T23:12:27.849ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113702025-03-07T23:12:27.849ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113712025-03-07T23:12:27.850ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113722025-03-07T23:12:27.852ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113732025-03-07T23:12:27.852ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113742025-03-07T23:12:27.852ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113752025-03-07T23:12:27.854ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113762025-03-07T23:12:27.854ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113772025-03-07T23:12:27.854ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113782025-03-07T23:12:27.854ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113792025-03-07T23:12:27.855ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113802025-03-07T23:12:27.857ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113812025-03-07T23:12:27.859ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113822025-03-07T23:12:27.859ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113832025-03-07T23:12:27.859ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113842025-03-07T23:12:27.868ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113852025-03-07T23:12:27.868ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113862025-03-07T23:12:27.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113872025-03-07T23:12:27.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113882025-03-07T23:12:27.872ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113892025-03-07T23:12:27.878ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ById(12ae9422-28d6-4476-8e2f-3bf8240cdde8) }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ById(0c4001f0-f776-4e82-98bc-918ec9d357f4) } result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113902025-03-07T23:12:27.878ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113912025-03-07T23:12:27.879ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113922025-03-07T23:12:27.879ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_node = ReleaseVolumeLock
113932025-03-07T23:12:27.887ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113942025-03-07T23:12:27.887ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113952025-03-07T23:12:27.896ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113962025-03-07T23:12:27.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113972025-03-07T23:12:27.905ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
113982025-03-07T23:12:27.905ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 23 saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
113992025-03-07T23:12:27.912ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
114002025-03-07T23:12:27.912ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51
114012025-03-07T23:12:27.928ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create sec_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
114022025-03-07T23:12:27.929ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 9885e3fc-278d-4b67-831d-ba9370462e51 saga_name = snapshot-create saga_result = SagaResult { saga_id: 9885e3fc-278d-4b67-831d-ba9370462e51, saga_log: SagaLog { saga_id: 9885e3fc-278d-4b67-831d-ba9370462e51, unwinding: false, events: [N022 started, N022 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N023 started, N023 succeeded], node_status: {0: Succeeded(String("baf11f31-f9c7-45fa-9f16-3a56e0173fed")), 1: Succeeded(String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")), 2: Succeeded(String("0a311746-8ded-4167-aac5-ff0b2c78506e")), 3: Succeeded(String("e95602f0-8b4e-44f0-9703-3d2d3a7d887d")), 4: Succeeded(Null), 5: Succeeded(Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("a65bc9d5-99cd-4c95-b385-2cc44b3a97c8"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3b630978-4463-4004-8de0-a8b886a99430"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("1d2704d1-f3fd-4667-b445-12e1d3edd8b6"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}]]), 6: Succeeded(Null), 7: Succeeded(Object {"block_size": Number(4096), "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "key": String("fEyAYGmx92Wv4j13L1GpNV3u2tlPz6CUKmC1NfUFqeo="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1051"), String("[::1]:1102"), String("[::1]:1001")]}, "type": String("region")}], "type": String("volume")}), 8: Succeeded(Null), 9: Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}), 10: Succeeded(Null), 11: Succeeded(Array [String("[::1]:39045"), Bool(false)]), 12: Succeeded(Number(3)), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Null), 16: Succeeded(Null), 17: Succeeded(Object {"[::1]:1000": String("[::1]:1002"), "[::1]:1100": String("[::1]:1103"), "[::1]:1150": String("[::1]:1152")}), 18: Succeeded(Null), 19: Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"call_pantry_attach_for_disk": Null, "call_pantry_detach_for_disk": Null, "call_pantry_snapshot_for_disk": Null, "created_destination_volume": Null, "created_snapshot": Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "time_created": String("2025-03-07T23:12:04.887848Z"), "time_modified": String("2025-03-07T23:12:04.887848Z")}, "ip": String("::1"), "pool_id": String("bba3352f-4e07-4bd1-bdf7-5f4138416688"), "port": Number(36409), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("2520a1a7-480c-468a-a7fd-6a117269f106"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("a65bc9d5-99cd-4c95-b385-2cc44b3a97c8"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "time_created": String("2025-03-07T23:12:01.989347Z"), "time_modified": String("2025-03-07T23:12:01.989347Z")}, "ip": String("::1"), "pool_id": String("15974051-fd8d-4f83-9273-5c6e7019b38e"), "port": Number(39323), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("43459067-35ee-4799-a90e-62fe47e85e2d"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("3b630978-4463-4004-8de0-a8b886a99430"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}], Array [Object {"identity": Object {"id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "time_created": String("2025-03-07T23:12:05.365939Z"), "time_modified": String("2025-03-07T23:12:05.365939Z")}, "ip": String("::1"), "pool_id": String("25887b79-b28b-4171-99a8-6100028a7952"), "port": Number(37937), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e20f8d49-ae5b-43bb-9784-7ca159b3f1f2"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("1d2704d1-f3fd-4667-b445-12e1d3edd8b6"), "time_created": String("2025-03-07T23:12:25.978027Z"), "time_modified": String("2025-03-07T23:12:25.978027Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e")}]], "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "detach_disk_from_pantry": Null, "disk_generation_number": Number(3), "finalized_snapshot": Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "disk_id": String("0c4001f0-f776-4e82-98bc-918ec9d357f4"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:12:26.268265Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:12:26.268265Z")}, "project_id": String("12ae9422-28d6-4476-8e2f-3bf8240cdde8"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5")}, "lock_id": String("e95602f0-8b4e-44f0-9703-3d2d3a7d887d"), "no_result": Null, "pantry_address": Array [String("[::1]:39045"), Bool(false)], "regions_ensure": Object {"block_size": Number(4096), "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("0a311746-8ded-4167-aac5-ff0b2c78506e"), "key": String("fEyAYGmx92Wv4j13L1GpNV3u2tlPz6CUKmC1NfUFqeo="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1051"), String("[::1]:1102"), String("[::1]:1001")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "replace_sockets_map": Object {"[::1]:1000": String("[::1]:1002"), "[::1]:1100": String("[::1]:1103"), "[::1]:1150": String("[::1]:1152")}, "snapshot_id": String("baf11f31-f9c7-45fa-9f16-3a56e0173fed"), "ssc_not_used": Null, "volume_id": String("28d7d230-58b2-49ea-8b5f-b2820b87c7e5"), "volume_lock": Null, "volume_unlock": Null} }) }
114032025-03-07T23:12:27.929ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 2728003 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c7e3a88e-63b0-4819-9200-c67fc9751f73 response_code = 201 uri = /v1/snapshots?project=demo-project
114042025-03-07T23:12:27.929ZINFOtest_unauthorized (external client test context): client received response status = 201
114052025-03-07T23:12:27.929ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images?project=demo-project
114062025-03-07T23:12:27.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 uri = /v1/images?project=demo-project
114072025-03-07T23:12:27.931ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 uri = /v1/images?project=demo-project
114082025-03-07T23:12:27.931ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
114092025-03-07T23:12:27.931ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114102025-03-07T23:12:27.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114112025-03-07T23:12:27.931ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114122025-03-07T23:12:27.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114132025-03-07T23:12:27.941ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114142025-03-07T23:12:27.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114152025-03-07T23:12:27.948ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
114162025-03-07T23:12:27.948ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
114172025-03-07T23:12:27.948ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114182025-03-07T23:12:27.948ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114192025-03-07T23:12:27.948ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114202025-03-07T23:12:27.956ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
114212025-03-07T23:12:27.956ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114222025-03-07T23:12:27.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114232025-03-07T23:12:27.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114242025-03-07T23:12:27.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
114252025-03-07T23:12:27.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
114262025-03-07T23:12:27.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114272025-03-07T23:12:27.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114282025-03-07T23:12:27.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114292025-03-07T23:12:27.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
114302025-03-07T23:12:27.965ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
114312025-03-07T23:12:27.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114322025-03-07T23:12:27.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114332025-03-07T23:12:27.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114342025-03-07T23:12:27.970ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
114352025-03-07T23:12:27.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114362025-03-07T23:12:27.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114372025-03-07T23:12:27.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114382025-03-07T23:12:27.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
114392025-03-07T23:12:27.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
114402025-03-07T23:12:27.977ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 uri = /v1/images?project=demo-project
114412025-03-07T23:12:27.977ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114422025-03-07T23:12:27.977ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114432025-03-07T23:12:27.977ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114442025-03-07T23:12:27.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114452025-03-07T23:12:27.979ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114462025-03-07T23:12:27.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114472025-03-07T23:12:27.981ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
114482025-03-07T23:12:27.982ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
114492025-03-07T23:12:27.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114502025-03-07T23:12:27.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114512025-03-07T23:12:27.982ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114522025-03-07T23:12:27.985ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
114532025-03-07T23:12:27.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114542025-03-07T23:12:27.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114552025-03-07T23:12:27.985ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114562025-03-07T23:12:27.989ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
114572025-03-07T23:12:27.989ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114582025-03-07T23:12:27.989ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114592025-03-07T23:12:27.990ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114602025-03-07T23:12:27.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
114612025-03-07T23:12:27.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
114622025-03-07T23:12:28.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
114632025-03-07T23:12:28.050ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
114642025-03-07T23:12:28.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114652025-03-07T23:12:28.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114662025-03-07T23:12:28.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114672025-03-07T23:12:28.056ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
114682025-03-07T23:12:28.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114692025-03-07T23:12:28.057ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114702025-03-07T23:12:28.058ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114712025-03-07T23:12:28.064ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
114722025-03-07T23:12:28.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114732025-03-07T23:12:28.065ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114742025-03-07T23:12:28.065ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114752025-03-07T23:12:28.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
114762025-03-07T23:12:28.074ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
114772025-03-07T23:12:28.074ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database uri = /v1/images?project=demo-project
114782025-03-07T23:12:28.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114792025-03-07T23:12:28.075ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114802025-03-07T23:12:28.128ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 198309 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e210dff8-7468-4f1a-be33-d1c2b659c593 response_code = 201 uri = /v1/images?project=demo-project
114812025-03-07T23:12:28.129ZINFOtest_unauthorized (external client test context): client received response status = 201
114822025-03-07T23:12:28.130ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/floating-ips?project=demo-project
114832025-03-07T23:12:28.130ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 uri = /v1/floating-ips?project=demo-project
114842025-03-07T23:12:28.130ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 uri = /v1/floating-ips?project=demo-project
114852025-03-07T23:12:28.130ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/floating-ips?project=demo-project
114862025-03-07T23:12:28.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114872025-03-07T23:12:28.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114882025-03-07T23:12:28.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114892025-03-07T23:12:28.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114902025-03-07T23:12:28.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114912025-03-07T23:12:28.139ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114922025-03-07T23:12:28.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
114932025-03-07T23:12:28.142ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
114942025-03-07T23:12:28.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114952025-03-07T23:12:28.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114962025-03-07T23:12:28.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114972025-03-07T23:12:28.146ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
114982025-03-07T23:12:28.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114992025-03-07T23:12:28.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115002025-03-07T23:12:28.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115012025-03-07T23:12:28.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115022025-03-07T23:12:28.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
115032025-03-07T23:12:28.159ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115042025-03-07T23:12:28.159ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115052025-03-07T23:12:28.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115062025-03-07T23:12:28.162ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
115072025-03-07T23:12:28.162ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
115082025-03-07T23:12:28.162ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115092025-03-07T23:12:28.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115102025-03-07T23:12:28.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115112025-03-07T23:12:28.166ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
115122025-03-07T23:12:28.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115132025-03-07T23:12:28.167ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115142025-03-07T23:12:28.167ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115152025-03-07T23:12:28.170ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115162025-03-07T23:12:28.172ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
115172025-03-07T23:12:28.173ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 uri = /v1/floating-ips?project=demo-project
115182025-03-07T23:12:28.173ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115192025-03-07T23:12:28.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115202025-03-07T23:12:28.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115212025-03-07T23:12:28.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115222025-03-07T23:12:28.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115232025-03-07T23:12:28.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115242025-03-07T23:12:28.184ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/floating-ips?project=demo-project
115252025-03-07T23:12:28.184ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/floating-ips?project=demo-project
115262025-03-07T23:12:28.184ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115272025-03-07T23:12:28.184ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115282025-03-07T23:12:28.191ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115292025-03-07T23:12:28.195ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/floating-ips?project=demo-project
115302025-03-07T23:12:28.197ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115312025-03-07T23:12:28.197ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115322025-03-07T23:12:28.197ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115332025-03-07T23:12:28.199ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/floating-ips?project=demo-project
115342025-03-07T23:12:28.200ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115352025-03-07T23:12:28.200ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115362025-03-07T23:12:28.202ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115372025-03-07T23:12:28.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/floating-ips?project=demo-project
115382025-03-07T23:12:28.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/floating-ips?project=demo-project
115392025-03-07T23:12:28.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115402025-03-07T23:12:28.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115412025-03-07T23:12:28.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115422025-03-07T23:12:28.229ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115432025-03-07T23:12:28.229ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115442025-03-07T23:12:28.230ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
115452025-03-07T23:12:28.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
115462025-03-07T23:12:28.233ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByOther("default IP pool for current silo") } uri = /v1/floating-ips?project=demo-project
115472025-03-07T23:12:28.234ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/floating-ips?project=demo-project
115482025-03-07T23:12:28.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115492025-03-07T23:12:28.234ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115502025-03-07T23:12:28.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115512025-03-07T23:12:28.239ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
115522025-03-07T23:12:28.241ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
115532025-03-07T23:12:28.241ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/floating-ips?project=demo-project
115542025-03-07T23:12:28.244ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByOther("default IP pool for current silo") } result = Ok(()) uri = /v1/floating-ips?project=demo-project
115552025-03-07T23:12:28.245ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database uri = /v1/floating-ips?project=demo-project
115562025-03-07T23:12:28.245ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115572025-03-07T23:12:28.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115582025-03-07T23:12:28.264ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
115592025-03-07T23:12:28.264ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115602025-03-07T23:12:28.278ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 148769 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6dd4a9b3-f596-4df4-ae29-2911b0840209 response_code = 201 uri = /v1/floating-ips?project=demo-project
115612025-03-07T23:12:28.279ZINFOtest_unauthorized (external client test context): client received response status = 201
115622025-03-07T23:12:28.281ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/saml?silo=demo-silo
115632025-03-07T23:12:28.282ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e uri = /v1/system/identity-providers/saml?silo=demo-silo
115642025-03-07T23:12:28.282ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e uri = /v1/system/identity-providers/saml?silo=demo-silo
115652025-03-07T23:12:28.282ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/identity-providers/saml?silo=demo-silo
115662025-03-07T23:12:28.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115672025-03-07T23:12:28.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115682025-03-07T23:12:28.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115692025-03-07T23:12:28.287ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115702025-03-07T23:12:28.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115712025-03-07T23:12:28.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115722025-03-07T23:12:28.295ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
115732025-03-07T23:12:28.295ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
115742025-03-07T23:12:28.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115752025-03-07T23:12:28.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115762025-03-07T23:12:28.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115772025-03-07T23:12:28.299ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
115782025-03-07T23:12:28.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115792025-03-07T23:12:28.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115802025-03-07T23:12:28.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115812025-03-07T23:12:28.302ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115822025-03-07T23:12:28.305ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
115832025-03-07T23:12:28.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115842025-03-07T23:12:28.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115852025-03-07T23:12:28.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115862025-03-07T23:12:28.310ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
115872025-03-07T23:12:28.311ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
115882025-03-07T23:12:28.311ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115892025-03-07T23:12:28.311ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115902025-03-07T23:12:28.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115912025-03-07T23:12:28.314ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
115922025-03-07T23:12:28.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115932025-03-07T23:12:28.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115942025-03-07T23:12:28.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115952025-03-07T23:12:28.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115962025-03-07T23:12:28.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
115972025-03-07T23:12:28.319ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e uri = /v1/system/identity-providers/saml?silo=demo-silo
115982025-03-07T23:12:28.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
115992025-03-07T23:12:28.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116002025-03-07T23:12:28.320ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116012025-03-07T23:12:28.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/identity-providers/saml?silo=demo-silo
116022025-03-07T23:12:28.325ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116032025-03-07T23:12:28.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116042025-03-07T23:12:28.325ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116052025-03-07T23:12:28.326ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116062025-03-07T23:12:28.333ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
116072025-03-07T23:12:28.339ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116082025-03-07T23:12:28.340ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116092025-03-07T23:12:28.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116102025-03-07T23:12:28.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116112025-03-07T23:12:28.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116122025-03-07T23:12:28.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116132025-03-07T23:12:28.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") }) uri = /v1/system/identity-providers/saml?silo=demo-silo
116142025-03-07T23:12:28.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116152025-03-07T23:12:28.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116162025-03-07T23:12:28.356ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116172025-03-07T23:12:28.356ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116182025-03-07T23:12:28.364ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116192025-03-07T23:12:28.365ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116202025-03-07T23:12:28.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116212025-03-07T23:12:28.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116222025-03-07T23:12:28.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116232025-03-07T23:12:28.376ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") }) result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116242025-03-07T23:12:28.434ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") }) uri = /v1/system/identity-providers/saml?silo=demo-silo
116252025-03-07T23:12:28.434ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116262025-03-07T23:12:28.434ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116272025-03-07T23:12:28.434ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116282025-03-07T23:12:28.435ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116292025-03-07T23:12:28.438ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116302025-03-07T23:12:28.438ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116312025-03-07T23:12:28.438ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116322025-03-07T23:12:28.438ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116332025-03-07T23:12:28.445ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116342025-03-07T23:12:28.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") }) result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116352025-03-07T23:12:28.451ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116362025-03-07T23:12:28.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116372025-03-07T23:12:28.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116382025-03-07T23:12:28.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116392025-03-07T23:12:28.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116402025-03-07T23:12:28.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116412025-03-07T23:12:28.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116422025-03-07T23:12:28.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116432025-03-07T23:12:28.592ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116442025-03-07T23:12:28.619ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 337056 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e067888-bbe1-4925-8d95-22de83c64b8e response_code = 201 uri = /v1/system/identity-providers/saml?silo=demo-silo
116452025-03-07T23:12:28.620ZINFOtest_unauthorized (external client test context): client received response status = 201
116462025-03-07T23:12:28.620ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/me/ssh-keys
116472025-03-07T23:12:28.620ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b uri = /v1/me/ssh-keys
116482025-03-07T23:12:28.620ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b uri = /v1/me/ssh-keys
116492025-03-07T23:12:28.620ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/me/ssh-keys
116502025-03-07T23:12:28.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116512025-03-07T23:12:28.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116522025-03-07T23:12:28.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116532025-03-07T23:12:28.622ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116542025-03-07T23:12:28.624ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116552025-03-07T23:12:28.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116562025-03-07T23:12:28.625ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
116572025-03-07T23:12:28.625ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
116582025-03-07T23:12:28.625ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116592025-03-07T23:12:28.625ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116602025-03-07T23:12:28.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116612025-03-07T23:12:28.627ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
116622025-03-07T23:12:28.627ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116632025-03-07T23:12:28.627ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116642025-03-07T23:12:28.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116652025-03-07T23:12:28.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
116662025-03-07T23:12:28.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
116672025-03-07T23:12:28.634ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116682025-03-07T23:12:28.635ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116692025-03-07T23:12:28.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116702025-03-07T23:12:28.636ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
116712025-03-07T23:12:28.636ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
116722025-03-07T23:12:28.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116732025-03-07T23:12:28.637ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116742025-03-07T23:12:28.637ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116752025-03-07T23:12:28.638ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
116762025-03-07T23:12:28.638ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116772025-03-07T23:12:28.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116782025-03-07T23:12:28.639ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116792025-03-07T23:12:28.640ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
116802025-03-07T23:12:28.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
116812025-03-07T23:12:28.643ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b uri = /v1/me/ssh-keys
116822025-03-07T23:12:28.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
116832025-03-07T23:12:28.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
116842025-03-07T23:12:28.643ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
116852025-03-07T23:12:28.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
116862025-03-07T23:12:28.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
116872025-03-07T23:12:28.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
116882025-03-07T23:12:28.647ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/me/ssh-keys
116892025-03-07T23:12:28.650ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/me/ssh-keys
116902025-03-07T23:12:28.650ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
116912025-03-07T23:12:28.650ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
116922025-03-07T23:12:28.650ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
116932025-03-07T23:12:28.651ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/me/ssh-keys
116942025-03-07T23:12:28.652ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
116952025-03-07T23:12:28.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
116962025-03-07T23:12:28.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
116972025-03-07T23:12:28.654ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/me/ssh-keys
116982025-03-07T23:12:28.657ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/me/ssh-keys
116992025-03-07T23:12:28.657ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/me/ssh-keys
117002025-03-07T23:12:28.663ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/me/ssh-keys
117012025-03-07T23:12:28.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
117022025-03-07T23:12:28.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117032025-03-07T23:12:28.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117042025-03-07T23:12:28.666ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/me/ssh-keys
117052025-03-07T23:12:28.667ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
117062025-03-07T23:12:28.667ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117072025-03-07T23:12:28.667ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117082025-03-07T23:12:28.670ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/me/ssh-keys
117092025-03-07T23:12:28.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/me/ssh-keys
117102025-03-07T23:12:28.672ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database uri = /v1/me/ssh-keys
117112025-03-07T23:12:28.673ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117122025-03-07T23:12:28.673ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117132025-03-07T23:12:28.701ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 81409 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d97b8d-e17e-43ac-8d18-d5f2939e285b response_code = 201 uri = /v1/me/ssh-keys
117142025-03-07T23:12:28.702ZINFOtest_unauthorized (external client test context): client received response status = 201
117152025-03-07T23:12:28.703ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/certificates
117162025-03-07T23:12:28.703ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 uri = /v1/certificates
117172025-03-07T23:12:28.703ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 uri = /v1/certificates
117182025-03-07T23:12:28.703ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/certificates
117192025-03-07T23:12:28.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117202025-03-07T23:12:28.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117212025-03-07T23:12:28.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117222025-03-07T23:12:28.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117232025-03-07T23:12:28.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117242025-03-07T23:12:28.707ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117252025-03-07T23:12:28.711ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
117262025-03-07T23:12:28.713ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117272025-03-07T23:12:28.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117282025-03-07T23:12:28.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117292025-03-07T23:12:28.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117302025-03-07T23:12:28.714ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117312025-03-07T23:12:28.714ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117322025-03-07T23:12:28.715ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117332025-03-07T23:12:28.716ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117342025-03-07T23:12:28.717ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117352025-03-07T23:12:28.721ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
117362025-03-07T23:12:28.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117372025-03-07T23:12:28.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117382025-03-07T23:12:28.722ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117392025-03-07T23:12:28.723ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
117402025-03-07T23:12:28.724ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117412025-03-07T23:12:28.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117422025-03-07T23:12:28.724ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117432025-03-07T23:12:28.724ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117442025-03-07T23:12:28.726ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117452025-03-07T23:12:28.726ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117462025-03-07T23:12:28.726ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117472025-03-07T23:12:28.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117482025-03-07T23:12:28.729ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117492025-03-07T23:12:28.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
117502025-03-07T23:12:28.733ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 uri = /v1/certificates
117512025-03-07T23:12:28.733ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117522025-03-07T23:12:28.733ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117532025-03-07T23:12:28.733ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117542025-03-07T23:12:28.735ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
117552025-03-07T23:12:28.735ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117562025-03-07T23:12:28.735ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117572025-03-07T23:12:28.735ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117582025-03-07T23:12:28.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117592025-03-07T23:12:28.738ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117602025-03-07T23:12:28.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117612025-03-07T23:12:28.739ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117622025-03-07T23:12:28.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117632025-03-07T23:12:28.741ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117642025-03-07T23:12:28.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
117652025-03-07T23:12:28.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117662025-03-07T23:12:28.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117672025-03-07T23:12:28.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117682025-03-07T23:12:28.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
117692025-03-07T23:12:28.746ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117702025-03-07T23:12:28.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117712025-03-07T23:12:28.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117722025-03-07T23:12:28.747ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117732025-03-07T23:12:28.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117742025-03-07T23:12:28.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
117752025-03-07T23:12:28.756ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = SiloCertificateList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/certificates
117762025-03-07T23:12:28.757ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/certificates
117772025-03-07T23:12:28.757ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database uri = /v1/certificates
117782025-03-07T23:12:28.757ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 roles = RoleSet { roles: {} } uri = /v1/certificates
117792025-03-07T23:12:28.757ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database result = Ok(()) uri = /v1/certificates
117802025-03-07T23:12:28.761ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/certificates
117812025-03-07T23:12:28.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database uri = /v1/certificates
117822025-03-07T23:12:28.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 roles = RoleSet { roles: {} } uri = /v1/certificates
117832025-03-07T23:12:28.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database result = Ok(()) uri = /v1/certificates
117842025-03-07T23:12:28.770ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/certificates
117852025-03-07T23:12:28.773ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = SiloCertificateList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/certificates
117862025-03-07T23:12:28.774ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database uri = /v1/certificates
117872025-03-07T23:12:28.774ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 roles = RoleSet { roles: {} } uri = /v1/certificates
117882025-03-07T23:12:28.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 resource = Database result = Ok(()) uri = /v1/certificates
117892025-03-07T23:12:28.829ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 4 reason = Signaled
117902025-03-07T23:12:28.829ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
117912025-03-07T23:12:28.829ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117922025-03-07T23:12:28.829ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
117932025-03-07T23:12:28.829ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
117942025-03-07T23:12:28.830ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
117952025-03-07T23:12:28.830ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 127614 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 80b111ac-7595-4bfb-831f-8730d5103942 response_code = 201 uri = /v1/certificates
117962025-03-07T23:12:28.831ZINFOtest_unauthorized (external client test context): client received response status = 201
117972025-03-07T23:12:28.831ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/experimental/v1/system/support-bundles
117982025-03-07T23:12:28.831ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 uri = /experimental/v1/system/support-bundles
117992025-03-07T23:12:28.831ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 uri = /experimental/v1/system/support-bundles
118002025-03-07T23:12:28.831ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /experimental/v1/system/support-bundles
118012025-03-07T23:12:28.831ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118022025-03-07T23:12:28.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118032025-03-07T23:12:28.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118042025-03-07T23:12:28.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118052025-03-07T23:12:28.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118062025-03-07T23:12:28.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118072025-03-07T23:12:28.835ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
118082025-03-07T23:12:28.839ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
118092025-03-07T23:12:28.839ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118102025-03-07T23:12:28.840ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118112025-03-07T23:12:28.840ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118122025-03-07T23:12:28.841ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
118132025-03-07T23:12:28.841ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
118142025-03-07T23:12:28.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118152025-03-07T23:12:28.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118162025-03-07T23:12:28.842ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118172025-03-07T23:12:28.843ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
118182025-03-07T23:12:28.843ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118192025-03-07T23:12:28.843ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118202025-03-07T23:12:28.843ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118212025-03-07T23:12:28.843ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118222025-03-07T23:12:28.844ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118232025-03-07T23:12:28.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118242025-03-07T23:12:28.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118252025-03-07T23:12:28.844ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118262025-03-07T23:12:28.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118272025-03-07T23:12:28.852ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
118282025-03-07T23:12:28.852ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118292025-03-07T23:12:28.852ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118302025-03-07T23:12:28.852ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118312025-03-07T23:12:28.853ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
118322025-03-07T23:12:28.859ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
118332025-03-07T23:12:28.862ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118342025-03-07T23:12:28.862ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118352025-03-07T23:12:28.862ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118362025-03-07T23:12:28.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
118372025-03-07T23:12:28.862ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
118382025-03-07T23:12:28.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118392025-03-07T23:12:28.862ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118402025-03-07T23:12:28.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118412025-03-07T23:12:28.864ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
118422025-03-07T23:12:28.864ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118432025-03-07T23:12:28.864ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118442025-03-07T23:12:28.864ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118452025-03-07T23:12:28.864ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118462025-03-07T23:12:28.866ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118472025-03-07T23:12:28.866ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118482025-03-07T23:12:28.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118492025-03-07T23:12:28.867ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118502025-03-07T23:12:28.868ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
118512025-03-07T23:12:28.872ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
118522025-03-07T23:12:28.872ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118532025-03-07T23:12:28.872ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118542025-03-07T23:12:28.873ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118552025-03-07T23:12:28.875ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118562025-03-07T23:12:28.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
118572025-03-07T23:12:28.878ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 uri = /experimental/v1/system/support-bundles
118582025-03-07T23:12:28.878ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Fleet uri = /experimental/v1/system/support-bundles
118592025-03-07T23:12:28.878ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /experimental/v1/system/support-bundles
118602025-03-07T23:12:28.878ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Database uri = /experimental/v1/system/support-bundles
118612025-03-07T23:12:28.878ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 roles = RoleSet { roles: {} } uri = /experimental/v1/system/support-bundles
118622025-03-07T23:12:28.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Database result = Ok(()) uri = /experimental/v1/system/support-bundles
118632025-03-07T23:12:28.884ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (changed) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:11:52.978055Z, time_modified: 2025-03-07T23:11:52.978055Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(2)) }, tls_certs: [TlsCertificate { digest: "a89b485d12b1fc30f132f51f96746442e44511f1cf71bf704eac926b83c469c0" }] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, db_silo: Silo { identity: SiloIdentity { id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:12:06.686087Z, time_modified: 2025-03-07T23:12:06.686087Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
118642025-03-07T23:12:28.884ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 55.066246ms iteration = 4 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":["a89b485d12b1fc30f132f51f96746442e44511f1cf71bf704eac926b83c469c0"]},"demo-silo.sys.oxide-dev.test":{"silo_id":"9d15cba3-0ce9-4052-9d95-bc0faa728916","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]}},"default_endpoint":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]},"warnings":["silo 9d15cba3-0ce9-4052-9d95-bc0faa728916 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0bb91424-f90c-4f11-acbb-98367ae5ccd9 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
118652025-03-07T23:12:28.884ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /experimental/v1/system/support-bundles
118662025-03-07T23:12:28.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Fleet result = Ok(()) uri = /experimental/v1/system/support-bundles
118672025-03-07T23:12:28.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Database uri = /experimental/v1/system/support-bundles
118682025-03-07T23:12:28.887ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 roles = RoleSet { roles: {} } uri = /experimental/v1/system/support-bundles
118692025-03-07T23:12:28.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 resource = Database result = Ok(()) uri = /experimental/v1/system/support-bundles
118702025-03-07T23:12:28.957ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 123357 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 942cd6ee-93d8-498c-a1bd-659c89b010e1 response_code = 201 uri = /experimental/v1/system/support-bundles
118712025-03-07T23:12:28.958ZINFOtest_unauthorized (external client test context): client received response status = 201
118722025-03-07T23:12:28.958ZINFOtest_unauthorized: verifying endpoints
118732025-03-07T23:12:28.958ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/policy
118742025-03-07T23:12:28.958ZINFOtest_unauthorized: test: privileged GET url = /v1/system/policy
118752025-03-07T23:12:28.958ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
118762025-03-07T23:12:28.958ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 uri = /v1/system/policy
118772025-03-07T23:12:28.958ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 uri = /v1/system/policy
118782025-03-07T23:12:28.958ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/policy
118792025-03-07T23:12:28.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118802025-03-07T23:12:28.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118812025-03-07T23:12:28.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118822025-03-07T23:12:28.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118832025-03-07T23:12:28.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118842025-03-07T23:12:28.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118852025-03-07T23:12:28.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
118862025-03-07T23:12:28.961ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
118872025-03-07T23:12:28.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118882025-03-07T23:12:28.961ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118892025-03-07T23:12:28.961ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118902025-03-07T23:12:28.963ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118912025-03-07T23:12:28.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118922025-03-07T23:12:28.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118932025-03-07T23:12:28.964ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118942025-03-07T23:12:28.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118952025-03-07T23:12:28.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
118962025-03-07T23:12:28.969ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118972025-03-07T23:12:28.969ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118982025-03-07T23:12:28.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118992025-03-07T23:12:28.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
119002025-03-07T23:12:28.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119012025-03-07T23:12:28.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119022025-03-07T23:12:28.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119032025-03-07T23:12:28.973ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119042025-03-07T23:12:28.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119052025-03-07T23:12:28.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119062025-03-07T23:12:28.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119072025-03-07T23:12:28.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119082025-03-07T23:12:28.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119092025-03-07T23:12:28.983ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
119102025-03-07T23:12:28.996ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 uri = /v1/system/policy
119112025-03-07T23:12:28.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Database uri = /v1/system/policy
119122025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 roles = RoleSet { roles: {} } uri = /v1/system/policy
119132025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Database result = Ok(()) uri = /v1/system/policy
119142025-03-07T23:12:28.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Fleet uri = /v1/system/policy
119152025-03-07T23:12:28.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
119162025-03-07T23:12:28.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Database uri = /v1/system/policy
119172025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 roles = RoleSet { roles: {} } uri = /v1/system/policy
119182025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Database result = Ok(()) uri = /v1/system/policy
119192025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/policy
119202025-03-07T23:12:28.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 resource = Fleet result = Ok(()) uri = /v1/system/policy
119212025-03-07T23:12:28.997ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 36982 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4e1c8034-051b-4ab2-b4c1-caed29503ba0 response_code = 200 uri = /v1/system/policy
119222025-03-07T23:12:28.997ZINFOtest_unauthorized (external client test context): client received response status = 200
119232025-03-07T23:12:28.997ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/policy
119242025-03-07T23:12:28.997ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
119252025-03-07T23:12:28.997ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a uri = /v1/system/policy
119262025-03-07T23:12:28.997ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a uri = /v1/system/policy
119272025-03-07T23:12:28.997ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/policy
119282025-03-07T23:12:28.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119292025-03-07T23:12:28.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119302025-03-07T23:12:28.997ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119312025-03-07T23:12:28.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119322025-03-07T23:12:28.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119332025-03-07T23:12:28.997ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119342025-03-07T23:12:29.000ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
119352025-03-07T23:12:29.000ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119362025-03-07T23:12:29.000ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119372025-03-07T23:12:29.000ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119382025-03-07T23:12:29.000ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119392025-03-07T23:12:29.003ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119402025-03-07T23:12:29.003ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119412025-03-07T23:12:29.003ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119422025-03-07T23:12:29.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119432025-03-07T23:12:29.004ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119442025-03-07T23:12:29.007ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
119452025-03-07T23:12:29.007ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119462025-03-07T23:12:29.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119472025-03-07T23:12:29.008ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119482025-03-07T23:12:29.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
119492025-03-07T23:12:29.009ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119502025-03-07T23:12:29.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119512025-03-07T23:12:29.009ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119522025-03-07T23:12:29.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119532025-03-07T23:12:29.012ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119542025-03-07T23:12:29.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119552025-03-07T23:12:29.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119562025-03-07T23:12:29.012ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119572025-03-07T23:12:29.014ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119582025-03-07T23:12:29.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
119592025-03-07T23:12:29.018ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a uri = /v1/system/policy
119602025-03-07T23:12:29.018ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Database uri = /v1/system/policy
119612025-03-07T23:12:29.018ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a roles = RoleSet { roles: {} } uri = /v1/system/policy
119622025-03-07T23:12:29.018ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Database result = Ok(()) uri = /v1/system/policy
119632025-03-07T23:12:29.019ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Fleet uri = /v1/system/policy
119642025-03-07T23:12:29.020ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
119652025-03-07T23:12:29.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Database uri = /v1/system/policy
119662025-03-07T23:12:29.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a roles = RoleSet { roles: {} } uri = /v1/system/policy
119672025-03-07T23:12:29.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Database result = Ok(()) uri = /v1/system/policy
119682025-03-07T23:12:29.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a roles = RoleSet { roles: {} } uri = /v1/system/policy
119692025-03-07T23:12:29.029ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a resource = Fleet result = Err(Forbidden) uri = /v1/system/policy
119702025-03-07T23:12:29.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 35885 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 30e8cef4-7a25-479d-b468-256b6d8eec2a response_code = 403 uri = /v1/system/policy
119712025-03-07T23:12:29.031ZINFOtest_unauthorized (external client test context): client received response status = 403
119722025-03-07T23:12:29.031ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/policy
119732025-03-07T23:12:29.031ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
119742025-03-07T23:12:29.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae uri = /v1/system/policy
119752025-03-07T23:12:29.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae uri = /v1/system/policy
119762025-03-07T23:12:29.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae uri = /v1/system/policy
119772025-03-07T23:12:29.031ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae uri = /v1/system/policy
119782025-03-07T23:12:29.032ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae resource = Database uri = /v1/system/policy
119792025-03-07T23:12:29.032ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae roles = RoleSet { roles: {} } uri = /v1/system/policy
119802025-03-07T23:12:29.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/policy
119812025-03-07T23:12:29.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 667 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fe6abdf-0832-4236-a036-775f862989ae response_code = 401 uri = /v1/system/policy
119822025-03-07T23:12:29.033ZINFOtest_unauthorized (external client test context): client received response status = 401
119832025-03-07T23:12:29.033ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/policy
119842025-03-07T23:12:29.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
119852025-03-07T23:12:29.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28cd9785-633a-4b62-800b-44835e40a26f uri = /v1/system/policy
119862025-03-07T23:12:29.033ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28cd9785-633a-4b62-800b-44835e40a26f uri = /v1/system/policy
119872025-03-07T23:12:29.033ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28cd9785-633a-4b62-800b-44835e40a26f uri = /v1/system/policy
119882025-03-07T23:12:29.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 163 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28cd9785-633a-4b62-800b-44835e40a26f response_code = 401 uri = /v1/system/policy
119892025-03-07T23:12:29.033ZINFOtest_unauthorized (external client test context): client received response status = 401
119902025-03-07T23:12:29.033ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/policy
119912025-03-07T23:12:29.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
119922025-03-07T23:12:29.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f762f965-e240-461b-967d-d3bbbf68b4ec uri = /v1/system/policy
119932025-03-07T23:12:29.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f762f965-e240-461b-967d-d3bbbf68b4ec uri = /v1/system/policy
119942025-03-07T23:12:29.467ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:133:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:141:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f762f965-e240-461b-967d-d3bbbf68b4ec uri = /v1/system/policy
119952025-03-07T23:12:29.467ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 434648 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f762f965-e240-461b-967d-d3bbbf68b4ec response_code = 401 uri = /v1/system/policy
119962025-03-07T23:12:29.468ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
119972025-03-07T23:12:29.468ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
119982025-03-07T23:12:29.468ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
119992025-03-07T23:12:29.468ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
120002025-03-07T23:12:29.469ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
120012025-03-07T23:12:29.475ZINFOtest_unauthorized (external client test context): client received response status = 401
120022025-03-07T23:12:29.475ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/policy
120032025-03-07T23:12:29.475ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/policy
120042025-03-07T23:12:29.475ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
120052025-03-07T23:12:29.475ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
120062025-03-07T23:12:29.475ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 uri = /v1/system/policy
120072025-03-07T23:12:29.475ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 uri = /v1/system/policy
120082025-03-07T23:12:29.475ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/policy
120092025-03-07T23:12:29.475ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120102025-03-07T23:12:29.475ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120112025-03-07T23:12:29.475ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120122025-03-07T23:12:29.475ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
120132025-03-07T23:12:29.475ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
120142025-03-07T23:12:29.475ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120152025-03-07T23:12:29.476ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120162025-03-07T23:12:29.476ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120172025-03-07T23:12:29.476ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
120182025-03-07T23:12:29.476ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
120192025-03-07T23:12:29.481ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
120202025-03-07T23:12:29.482ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
120212025-03-07T23:12:29.482ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120222025-03-07T23:12:29.482ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120232025-03-07T23:12:29.482ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120242025-03-07T23:12:29.484ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
120252025-03-07T23:12:29.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120262025-03-07T23:12:29.485ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120272025-03-07T23:12:29.486ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120282025-03-07T23:12:29.488ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
120292025-03-07T23:12:29.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
120302025-03-07T23:12:29.492ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120312025-03-07T23:12:29.492ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120322025-03-07T23:12:29.493ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120332025-03-07T23:12:29.496ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
120342025-03-07T23:12:29.498ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
120352025-03-07T23:12:29.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120362025-03-07T23:12:29.498ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120372025-03-07T23:12:29.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120382025-03-07T23:12:29.500ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
120392025-03-07T23:12:29.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120402025-03-07T23:12:29.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120412025-03-07T23:12:29.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120422025-03-07T23:12:29.504ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
120432025-03-07T23:12:29.507ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
120442025-03-07T23:12:29.507ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 uri = /v1/system/policy
120452025-03-07T23:12:29.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 resource = Fleet uri = /v1/system/policy
120462025-03-07T23:12:29.507ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
120472025-03-07T23:12:29.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 resource = Database uri = /v1/system/policy
120482025-03-07T23:12:29.507ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 roles = RoleSet { roles: {} } uri = /v1/system/policy
120492025-03-07T23:12:29.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 resource = Database result = Ok(()) uri = /v1/system/policy
120502025-03-07T23:12:29.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 roles = RoleSet { roles: {} } uri = /v1/system/policy
120512025-03-07T23:12:29.519ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 resource = Fleet result = Err(Forbidden) uri = /v1/system/policy
120522025-03-07T23:12:29.519ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 49175 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1dd31770-91ea-4efd-9135-a81dd1b19c06 response_code = 403 uri = /v1/system/policy
120532025-03-07T23:12:29.520ZINFOtest_unauthorized (external client test context): client received response status = 403
120542025-03-07T23:12:29.520ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/policy
120552025-03-07T23:12:29.520ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/policy
120562025-03-07T23:12:29.520ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 uri = /v1/system/policy
120572025-03-07T23:12:29.521ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 uri = /v1/system/policy
120582025-03-07T23:12:29.521ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 uri = /v1/system/policy
120592025-03-07T23:12:29.521ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 uri = /v1/system/policy
120602025-03-07T23:12:29.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 resource = Fleet uri = /v1/system/policy
120612025-03-07T23:12:29.522ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 roles = RoleSet { roles: {} } uri = /v1/system/policy
120622025-03-07T23:12:29.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/policy
120632025-03-07T23:12:29.522ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1212 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 05396b32-d86c-4d8c-8682-5b52bba4f4a3 response_code = 401 uri = /v1/system/policy
120642025-03-07T23:12:29.522ZINFOtest_unauthorized (external client test context): client received response status = 401
120652025-03-07T23:12:29.522ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/policy
120662025-03-07T23:12:29.522ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/policy
120672025-03-07T23:12:29.523ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d33847c5-1bf6-43b6-aa11-cfa703d4102b uri = /v1/system/policy
120682025-03-07T23:12:29.523ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d33847c5-1bf6-43b6-aa11-cfa703d4102b uri = /v1/system/policy
120692025-03-07T23:12:29.523ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d33847c5-1bf6-43b6-aa11-cfa703d4102b uri = /v1/system/policy
120702025-03-07T23:12:29.523ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 597 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d33847c5-1bf6-43b6-aa11-cfa703d4102b response_code = 401 uri = /v1/system/policy
120712025-03-07T23:12:29.524ZINFOtest_unauthorized (external client test context): client received response status = 401
120722025-03-07T23:12:29.524ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/policy
120732025-03-07T23:12:29.525ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/policy
120742025-03-07T23:12:29.525ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cb847d62-19e3-4a9b-9f95-680e0f69f8ae uri = /v1/system/policy
120752025-03-07T23:12:29.525ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cb847d62-19e3-4a9b-9f95-680e0f69f8ae uri = /v1/system/policy
120762025-03-07T23:12:29.526ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:157:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:165:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cb847d62-19e3-4a9b-9f95-680e0f69f8ae uri = /v1/system/policy
120772025-03-07T23:12:29.527ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1758 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cb847d62-19e3-4a9b-9f95-680e0f69f8ae response_code = 401 uri = /v1/system/policy
120782025-03-07T23:12:29.527ZINFOtest_unauthorized (external client test context): client received response status = 401
120792025-03-07T23:12:29.527ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/policy
120802025-03-07T23:12:29.527ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/policy
120812025-03-07T23:12:29.528ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 946fc76e-6478-402b-935c-c407552709c1 uri = /v1/system/policy
120822025-03-07T23:12:29.528ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 202 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 946fc76e-6478-402b-935c-c407552709c1 response_code = 405 uri = /v1/system/policy
120832025-03-07T23:12:29.529ZINFOtest_unauthorized (external client test context): client received response status = 405
120842025-03-07T23:12:29.529ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/policy
120852025-03-07T23:12:29.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/policy
120862025-03-07T23:12:29.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1242dd9-1e44-430c-b37a-45c2b80ecb45 uri = /v1/system/policy
120872025-03-07T23:12:29.529ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1242dd9-1e44-430c-b37a-45c2b80ecb45 response_code = 405 uri = /v1/system/policy
120882025-03-07T23:12:29.529ZINFOtest_unauthorized (external client test context): client received response status = 405
120892025-03-07T23:12:29.529ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/policy
120902025-03-07T23:12:29.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/policy
120912025-03-07T23:12:29.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7bca6cb3-90bc-440d-ac96-89f630d256e5 uri = /v1/system/policy
120922025-03-07T23:12:29.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7bca6cb3-90bc-440d-ac96-89f630d256e5 response_code = 405 uri = /v1/system/policy
120932025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client received response status = 405
120942025-03-07T23:12:29.530ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/policy
120952025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/policy
120962025-03-07T23:12:29.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d055fc2e-03af-4297-9b2c-b24e7a50c7f4 uri = /v1/system/policy
120972025-03-07T23:12:29.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d055fc2e-03af-4297-9b2c-b24e7a50c7f4 response_code = 405 uri = /v1/system/policy
120982025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client received response status = 405
120992025-03-07T23:12:29.530ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/policy
121002025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/policy
121012025-03-07T23:12:29.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 34447a2e-ad16-42fc-8818-1ba15601ff95 uri = /v1/system/policy
121022025-03-07T23:12:29.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 34447a2e-ad16-42fc-8818-1ba15601ff95 response_code = 405 uri = /v1/system/policy
121032025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client received response status = 405
121042025-03-07T23:12:29.530ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/policy
121052025-03-07T23:12:29.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/policy
121062025-03-07T23:12:29.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d31c788c-1bc5-4a6c-b5ec-b7d8c1e4ad7b uri = /v1/system/policy
121072025-03-07T23:12:29.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d31c788c-1bc5-4a6c-b5ec-b7d8c1e4ad7b response_code = 405 uri = /v1/system/policy
121082025-03-07T23:12:29.531ZINFOtest_unauthorized (external client test context): client received response status = 405
121092025-03-07T23:12:29.531ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/policy
121102025-03-07T23:12:29.531ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/policy
121112025-03-07T23:12:29.531ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3d5bb44a-7fc8-43cf-8335-943946ff9d3d uri = /v1/system/policy
121122025-03-07T23:12:29.531ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3d5bb44a-7fc8-43cf-8335-943946ff9d3d response_code = 405 uri = /v1/system/policy
121132025-03-07T23:12:29.532ZINFOtest_unauthorized (external client test context): client received response status = 405
121142025-03-07T23:12:29.532ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/policy
121152025-03-07T23:12:29.532ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/policy
121162025-03-07T23:12:29.532ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 655b6dc2-0f51-40b4-a591-560031345c83 uri = /v1/system/policy
121172025-03-07T23:12:29.532ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 655b6dc2-0f51-40b4-a591-560031345c83 response_code = 405 uri = /v1/system/policy
121182025-03-07T23:12:29.532ZINFOtest_unauthorized (external client test context): client received response status = 405
121192025-03-07T23:12:29.532ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/policy
121202025-03-07T23:12:29.532ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/policy
121212025-03-07T23:12:29.533ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3e2484b3-6ab4-449f-8b9f-8399bfad1794 uri = /v1/system/policy
121222025-03-07T23:12:29.533ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 173 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3e2484b3-6ab4-449f-8b9f-8399bfad1794 response_code = 405 uri = /v1/system/policy
121232025-03-07T23:12:29.533ZINFOtest_unauthorized (external client test context): client received response status = 405
121242025-03-07T23:12:29.533ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/policy
121252025-03-07T23:12:29.533ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/policy
121262025-03-07T23:12:29.534ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 47769fb1-0760-463b-b8f7-b0045ebaa55a uri = /v1/system/policy
121272025-03-07T23:12:29.534ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 47769fb1-0760-463b-b8f7-b0045ebaa55a response_code = 405 uri = /v1/system/policy
121282025-03-07T23:12:29.534ZINFOtest_unauthorized (external client test context): client received response status = 405
121292025-03-07T23:12:29.534ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/policy
121302025-03-07T23:12:29.534ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/policy
121312025-03-07T23:12:29.534ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 97af1360-f016-4071-8f57-fed5b29dd6fd uri = /v1/system/policy
121322025-03-07T23:12:29.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 97af1360-f016-4071-8f57-fed5b29dd6fd response_code = 405 uri = /v1/system/policy
121332025-03-07T23:12:29.536ZINFOtest_unauthorized (external client test context): client received response status = 405
121342025-03-07T23:12:29.536ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/policy
121352025-03-07T23:12:29.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/policy
121362025-03-07T23:12:29.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5c622d2a-bf73-4d04-88dd-ad5dbef637ae uri = /v1/system/policy
121372025-03-07T23:12:29.538ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5c622d2a-bf73-4d04-88dd-ad5dbef637ae response_code = 405 uri = /v1/system/policy
121382025-03-07T23:12:29.538ZINFOtest_unauthorized (external client test context): client received response status = 405
121392025-03-07T23:12:29.538ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/policy
121402025-03-07T23:12:29.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/policy
121412025-03-07T23:12:29.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e uri = /v1/system/policy
121422025-03-07T23:12:29.538ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e uri = /v1/system/policy
121432025-03-07T23:12:29.538ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/policy
121442025-03-07T23:12:29.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121452025-03-07T23:12:29.538ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121462025-03-07T23:12:29.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121472025-03-07T23:12:29.539ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
121482025-03-07T23:12:29.539ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
121492025-03-07T23:12:29.542ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
121502025-03-07T23:12:29.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121512025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121522025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121532025-03-07T23:12:29.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
121542025-03-07T23:12:29.546ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
121552025-03-07T23:12:29.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121562025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121572025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121582025-03-07T23:12:29.546ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
121592025-03-07T23:12:29.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121602025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121612025-03-07T23:12:29.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121622025-03-07T23:12:29.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
121632025-03-07T23:12:29.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
121642025-03-07T23:12:29.550ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121652025-03-07T23:12:29.550ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121662025-03-07T23:12:29.550ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121672025-03-07T23:12:29.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
121682025-03-07T23:12:29.553ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
121692025-03-07T23:12:29.553ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121702025-03-07T23:12:29.553ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121712025-03-07T23:12:29.553ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121722025-03-07T23:12:29.553ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
121732025-03-07T23:12:29.554ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121742025-03-07T23:12:29.554ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121752025-03-07T23:12:29.554ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121762025-03-07T23:12:29.555ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
121772025-03-07T23:12:29.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
121782025-03-07T23:12:29.559ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e uri = /v1/system/policy
121792025-03-07T23:12:29.559ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Database uri = /v1/system/policy
121802025-03-07T23:12:29.559ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e roles = RoleSet { roles: {} } uri = /v1/system/policy
121812025-03-07T23:12:29.559ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Database result = Ok(()) uri = /v1/system/policy
121822025-03-07T23:12:29.560ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Fleet uri = /v1/system/policy
121832025-03-07T23:12:29.560ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
121842025-03-07T23:12:29.560ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Database uri = /v1/system/policy
121852025-03-07T23:12:29.560ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e roles = RoleSet { roles: {} } uri = /v1/system/policy
121862025-03-07T23:12:29.560ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Database result = Ok(()) uri = /v1/system/policy
121872025-03-07T23:12:29.564ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/policy
121882025-03-07T23:12:29.569ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e resource = Fleet result = Ok(()) uri = /v1/system/policy
121892025-03-07T23:12:29.570ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
121902025-03-07T23:12:29.570ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 35433 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f1042d71-b4c2-4261-b3a5-9680445f364e response_code = 200 uri = /v1/system/policy
121912025-03-07T23:12:29.571ZINFOtest_unauthorized (external client test context): client received response status = 200
121922025-03-07T23:12:29.572ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools
121932025-03-07T23:12:29.572ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools
121942025-03-07T23:12:29.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
121952025-03-07T23:12:29.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 uri = /v1/system/ip-pools
121962025-03-07T23:12:29.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
121972025-03-07T23:12:29.572ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 uri = /v1/system/ip-pools
121982025-03-07T23:12:29.573ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
121992025-03-07T23:12:29.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122002025-03-07T23:12:29.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122012025-03-07T23:12:29.573ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122022025-03-07T23:12:29.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122032025-03-07T23:12:29.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = a95176ef-adb1-4d30-8080-84f95b7bca10 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122042025-03-07T23:12:29.577ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = a95176ef-adb1-4d30-8080-84f95b7bca10 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122052025-03-07T23:12:29.577ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = a95176ef-adb1-4d30-8080-84f95b7bca10 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122062025-03-07T23:12:29.578ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = a95176ef-adb1-4d30-8080-84f95b7bca10 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122072025-03-07T23:12:29.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122082025-03-07T23:12:29.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122092025-03-07T23:12:29.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122102025-03-07T23:12:29.581ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7148 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = a95176ef-adb1-4d30-8080-84f95b7bca10 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
122112025-03-07T23:12:29.582ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "a95176ef-adb1-4d30-8080-84f95b7bca10", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:29 GMT"} })
122122025-03-07T23:12:29.582ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122132025-03-07T23:12:29.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
122142025-03-07T23:12:29.582ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
122152025-03-07T23:12:29.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122162025-03-07T23:12:29.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122172025-03-07T23:12:29.583ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122182025-03-07T23:12:29.583ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae6172e-93f8-4721-ae6f-4e7ca818ce62 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122192025-03-07T23:12:29.584ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae6172e-93f8-4721-ae6f-4e7ca818ce62 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122202025-03-07T23:12:29.584ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae6172e-93f8-4721-ae6f-4e7ca818ce62 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122212025-03-07T23:12:29.585ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae6172e-93f8-4721-ae6f-4e7ca818ce62 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122222025-03-07T23:12:29.587ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
122232025-03-07T23:12:29.589ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122242025-03-07T23:12:29.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122252025-03-07T23:12:29.590ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122262025-03-07T23:12:29.590ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3980 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae6172e-93f8-4721-ae6f-4e7ca818ce62 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
122272025-03-07T23:12:29.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122282025-03-07T23:12:29.590ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "cae6172e-93f8-4721-ae6f-4e7ca818ce62", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:29 GMT"} })
122292025-03-07T23:12:29.590ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122302025-03-07T23:12:29.590ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
122312025-03-07T23:12:29.590ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
122322025-03-07T23:12:29.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122332025-03-07T23:12:29.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122342025-03-07T23:12:29.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122352025-03-07T23:12:29.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122362025-03-07T23:12:29.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122372025-03-07T23:12:29.591ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
122382025-03-07T23:12:29.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
122392025-03-07T23:12:29.615ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122402025-03-07T23:12:29.615ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122412025-03-07T23:12:29.616ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122422025-03-07T23:12:29.619ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
122432025-03-07T23:12:29.621ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
122442025-03-07T23:12:29.621ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122452025-03-07T23:12:29.622ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122462025-03-07T23:12:29.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122472025-03-07T23:12:29.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
122482025-03-07T23:12:29.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122492025-03-07T23:12:29.624ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122502025-03-07T23:12:29.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122512025-03-07T23:12:29.628ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
122522025-03-07T23:12:29.630ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
122532025-03-07T23:12:29.630ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 uri = /v1/system/ip-pools
122542025-03-07T23:12:29.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = IpPoolList uri = /v1/system/ip-pools
122552025-03-07T23:12:29.630ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
122562025-03-07T23:12:29.631ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = Database uri = /v1/system/ip-pools
122572025-03-07T23:12:29.631ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
122582025-03-07T23:12:29.631ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = Database result = Ok(()) uri = /v1/system/ip-pools
122592025-03-07T23:12:29.631ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
122602025-03-07T23:12:29.632ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
122612025-03-07T23:12:29.633ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
122622025-03-07T23:12:29.635ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
122632025-03-07T23:12:29.643ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
122642025-03-07T23:12:29.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = Database uri = /v1/system/ip-pools
122652025-03-07T23:12:29.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
122662025-03-07T23:12:29.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 resource = Database result = Ok(()) uri = /v1/system/ip-pools
122672025-03-07T23:12:29.659ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 87539 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 782e8e24-7d1d-4554-94ac-e84bb96e6931 response_code = 200 uri = /v1/system/ip-pools
122682025-03-07T23:12:29.660ZINFOtest_unauthorized (external client test context): client received response status = 200
122692025-03-07T23:12:29.660ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools
122702025-03-07T23:12:29.660ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
122712025-03-07T23:12:29.660ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 uri = /v1/system/ip-pools
122722025-03-07T23:12:29.660ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 uri = /v1/system/ip-pools
122732025-03-07T23:12:29.660ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools
122742025-03-07T23:12:29.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122752025-03-07T23:12:29.660ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122762025-03-07T23:12:29.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122772025-03-07T23:12:29.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122782025-03-07T23:12:29.664ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122792025-03-07T23:12:29.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122802025-03-07T23:12:29.668ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
122812025-03-07T23:12:29.669ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
122822025-03-07T23:12:29.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122832025-03-07T23:12:29.669ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122842025-03-07T23:12:29.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122852025-03-07T23:12:29.670ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
122862025-03-07T23:12:29.671ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122872025-03-07T23:12:29.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122882025-03-07T23:12:29.671ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122892025-03-07T23:12:29.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
122902025-03-07T23:12:29.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
122912025-03-07T23:12:29.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122922025-03-07T23:12:29.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122932025-03-07T23:12:29.678ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122942025-03-07T23:12:29.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
122952025-03-07T23:12:29.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
122962025-03-07T23:12:29.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122972025-03-07T23:12:29.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122982025-03-07T23:12:29.679ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122992025-03-07T23:12:29.680ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123002025-03-07T23:12:29.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123012025-03-07T23:12:29.680ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123022025-03-07T23:12:29.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123032025-03-07T23:12:29.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123042025-03-07T23:12:29.685ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
123052025-03-07T23:12:29.686ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 uri = /v1/system/ip-pools
123062025-03-07T23:12:29.687ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 resource = IpPoolList uri = /v1/system/ip-pools
123072025-03-07T23:12:29.687ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
123082025-03-07T23:12:29.687ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 resource = Database uri = /v1/system/ip-pools
123092025-03-07T23:12:29.687ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
123102025-03-07T23:12:29.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 resource = Database result = Ok(()) uri = /v1/system/ip-pools
123112025-03-07T23:12:29.688ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
123122025-03-07T23:12:29.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 resource = IpPoolList result = Err(Forbidden) uri = /v1/system/ip-pools
123132025-03-07T23:12:29.695ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 34976 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = aab2621c-7c50-4245-bf48-bf5593b9f362 response_code = 403 uri = /v1/system/ip-pools
123142025-03-07T23:12:29.696ZINFOtest_unauthorized (external client test context): client received response status = 403
123152025-03-07T23:12:29.696ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools
123162025-03-07T23:12:29.696ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
123172025-03-07T23:12:29.697ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd uri = /v1/system/ip-pools
123182025-03-07T23:12:29.697ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd uri = /v1/system/ip-pools
123192025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd uri = /v1/system/ip-pools
123202025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd uri = /v1/system/ip-pools
123212025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd resource = IpPoolList uri = /v1/system/ip-pools
123222025-03-07T23:12:29.698ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
123232025-03-07T23:12:29.698ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd resource = IpPoolList result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools
123242025-03-07T23:12:29.698ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 672 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 054ff6a1-0a5b-4608-908b-edaf5d01f3bd response_code = 401 uri = /v1/system/ip-pools
123252025-03-07T23:12:29.698ZINFOtest_unauthorized (external client test context): client received response status = 401
123262025-03-07T23:12:29.698ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools
123272025-03-07T23:12:29.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
123282025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e146f0b6-dc83-4451-a170-d0764cc2345e uri = /v1/system/ip-pools
123292025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e146f0b6-dc83-4451-a170-d0764cc2345e uri = /v1/system/ip-pools
123302025-03-07T23:12:29.698ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e146f0b6-dc83-4451-a170-d0764cc2345e uri = /v1/system/ip-pools
123312025-03-07T23:12:29.698ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 225 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e146f0b6-dc83-4451-a170-d0764cc2345e response_code = 401 uri = /v1/system/ip-pools
123322025-03-07T23:12:29.698ZINFOtest_unauthorized (external client test context): client received response status = 401
123332025-03-07T23:12:29.698ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools
123342025-03-07T23:12:29.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
123352025-03-07T23:12:29.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05da0aeb-7c81-4939-898c-1845a5395601 uri = /v1/system/ip-pools
123362025-03-07T23:12:29.700ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05da0aeb-7c81-4939-898c-1845a5395601 uri = /v1/system/ip-pools
123372025-03-07T23:12:29.700ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1085:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1102:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05da0aeb-7c81-4939-898c-1845a5395601 uri = /v1/system/ip-pools
123382025-03-07T23:12:29.700ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 835 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05da0aeb-7c81-4939-898c-1845a5395601 response_code = 401 uri = /v1/system/ip-pools
123392025-03-07T23:12:29.700ZINFOtest_unauthorized (external client test context): client received response status = 401
123402025-03-07T23:12:29.700ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools
123412025-03-07T23:12:29.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools
123422025-03-07T23:12:29.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 25382a59-d166-492d-a433-12e9cec01e7a uri = /v1/system/ip-pools
123432025-03-07T23:12:29.701ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 25382a59-d166-492d-a433-12e9cec01e7a response_code = 405 uri = /v1/system/ip-pools
123442025-03-07T23:12:29.702ZINFOtest_unauthorized (external client test context): client received response status = 405
123452025-03-07T23:12:29.702ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools
123462025-03-07T23:12:29.702ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools
123472025-03-07T23:12:29.702ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1bcdbc48-91c9-433a-a9b6-8847ab13d3b9 uri = /v1/system/ip-pools
123482025-03-07T23:12:29.702ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1bcdbc48-91c9-433a-a9b6-8847ab13d3b9 response_code = 405 uri = /v1/system/ip-pools
123492025-03-07T23:12:29.702ZINFOtest_unauthorized (external client test context): client received response status = 405
123502025-03-07T23:12:29.702ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools
123512025-03-07T23:12:29.702ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools
123522025-03-07T23:12:29.702ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 75c26917-dc22-4b2f-ae04-e4a857973ea7 uri = /v1/system/ip-pools
123532025-03-07T23:12:29.702ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 75c26917-dc22-4b2f-ae04-e4a857973ea7 response_code = 405 uri = /v1/system/ip-pools
123542025-03-07T23:12:29.702ZINFOtest_unauthorized (external client test context): client received response status = 405
123552025-03-07T23:12:29.703ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools
123562025-03-07T23:12:29.703ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools
123572025-03-07T23:12:29.703ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2bc119a1-0069-4e60-9f1d-7af2b51ff80b uri = /v1/system/ip-pools
123582025-03-07T23:12:29.703ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2bc119a1-0069-4e60-9f1d-7af2b51ff80b response_code = 405 uri = /v1/system/ip-pools
123592025-03-07T23:12:29.703ZINFOtest_unauthorized (external client test context): client received response status = 405
123602025-03-07T23:12:29.703ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools
123612025-03-07T23:12:29.703ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools
123622025-03-07T23:12:29.703ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd uri = /v1/system/ip-pools
123632025-03-07T23:12:29.703ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd uri = /v1/system/ip-pools
123642025-03-07T23:12:29.703ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools
123652025-03-07T23:12:29.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123662025-03-07T23:12:29.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123672025-03-07T23:12:29.704ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123682025-03-07T23:12:29.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123692025-03-07T23:12:29.706ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123702025-03-07T23:12:29.706ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123712025-03-07T23:12:29.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
123722025-03-07T23:12:29.708ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123732025-03-07T23:12:29.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123742025-03-07T23:12:29.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123752025-03-07T23:12:29.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123762025-03-07T23:12:29.718ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123772025-03-07T23:12:29.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123782025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123792025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123802025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123812025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
123822025-03-07T23:12:29.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123832025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123842025-03-07T23:12:29.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123852025-03-07T23:12:29.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
123862025-03-07T23:12:29.728ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123872025-03-07T23:12:29.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123882025-03-07T23:12:29.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123892025-03-07T23:12:29.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123902025-03-07T23:12:29.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123912025-03-07T23:12:29.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123922025-03-07T23:12:29.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123932025-03-07T23:12:29.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123942025-03-07T23:12:29.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123952025-03-07T23:12:29.747ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
123962025-03-07T23:12:29.748ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd uri = /v1/system/ip-pools
123972025-03-07T23:12:29.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd resource = IpPoolList uri = /v1/system/ip-pools
123982025-03-07T23:12:29.748ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
123992025-03-07T23:12:29.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd resource = Database uri = /v1/system/ip-pools
124002025-03-07T23:12:29.748ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124012025-03-07T23:12:29.748ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd resource = Database result = Ok(()) uri = /v1/system/ip-pools
124022025-03-07T23:12:29.751ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124032025-03-07T23:12:29.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd resource = IpPoolList result = Err(Forbidden) uri = /v1/system/ip-pools
124042025-03-07T23:12:29.756ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 53186 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 74016887-c203-4117-999e-cb40b61d7ecd response_code = 403 uri = /v1/system/ip-pools
124052025-03-07T23:12:29.756ZINFOtest_unauthorized (external client test context): client received response status = 403
124062025-03-07T23:12:29.758ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools
124072025-03-07T23:12:29.760ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools
124082025-03-07T23:12:29.760ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa uri = /v1/system/ip-pools
124092025-03-07T23:12:29.760ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa uri = /v1/system/ip-pools
124102025-03-07T23:12:29.760ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa uri = /v1/system/ip-pools
124112025-03-07T23:12:29.760ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa uri = /v1/system/ip-pools
124122025-03-07T23:12:29.760ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa resource = IpPoolList uri = /v1/system/ip-pools
124132025-03-07T23:12:29.760ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124142025-03-07T23:12:29.760ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa resource = IpPoolList result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools
124152025-03-07T23:12:29.760ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 865 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f92fb54-895c-4520-ab4b-f005fcaab0fa response_code = 401 uri = /v1/system/ip-pools
124162025-03-07T23:12:29.760ZINFOtest_unauthorized (external client test context): client received response status = 401
124172025-03-07T23:12:29.760ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools
124182025-03-07T23:12:29.762ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools
124192025-03-07T23:12:29.762ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb1e1891-dccc-4129-a754-313fdbea0957 uri = /v1/system/ip-pools
124202025-03-07T23:12:29.762ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb1e1891-dccc-4129-a754-313fdbea0957 uri = /v1/system/ip-pools
124212025-03-07T23:12:29.763ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb1e1891-dccc-4129-a754-313fdbea0957 uri = /v1/system/ip-pools
124222025-03-07T23:12:29.764ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 546 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb1e1891-dccc-4129-a754-313fdbea0957 response_code = 401 uri = /v1/system/ip-pools
124232025-03-07T23:12:29.768ZINFOtest_unauthorized (external client test context): client received response status = 401
124242025-03-07T23:12:29.769ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools
124252025-03-07T23:12:29.769ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools
124262025-03-07T23:12:29.769ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 43edec63-33d9-4ead-838a-caab3776e333 uri = /v1/system/ip-pools
124272025-03-07T23:12:29.770ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 43edec63-33d9-4ead-838a-caab3776e333 uri = /v1/system/ip-pools
124282025-03-07T23:12:29.772ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1114:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1122:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 43edec63-33d9-4ead-838a-caab3776e333 uri = /v1/system/ip-pools
124292025-03-07T23:12:29.772ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2742 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 43edec63-33d9-4ead-838a-caab3776e333 response_code = 401 uri = /v1/system/ip-pools
124302025-03-07T23:12:29.772ZINFOtest_unauthorized (external client test context): client received response status = 401
124312025-03-07T23:12:29.773ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools
124322025-03-07T23:12:29.773ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools
124332025-03-07T23:12:29.774ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b72766b7-babc-4f99-ac3b-3f72656a42ed uri = /v1/system/ip-pools
124342025-03-07T23:12:29.774ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 199 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b72766b7-babc-4f99-ac3b-3f72656a42ed response_code = 405 uri = /v1/system/ip-pools
124352025-03-07T23:12:29.777ZINFOtest_unauthorized (external client test context): client received response status = 405
124362025-03-07T23:12:29.777ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools
124372025-03-07T23:12:29.777ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools
124382025-03-07T23:12:29.778ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7c45890c-9e3e-47a9-8f99-ff63a82ec81e uri = /v1/system/ip-pools
124392025-03-07T23:12:29.778ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 201 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7c45890c-9e3e-47a9-8f99-ff63a82ec81e response_code = 405 uri = /v1/system/ip-pools
124402025-03-07T23:12:29.780ZINFOtest_unauthorized (external client test context): client received response status = 405
124412025-03-07T23:12:29.781ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools
124422025-03-07T23:12:29.781ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools
124432025-03-07T23:12:29.786ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3483f600-0382-47d6-9510-7f5a7bb6afd6 uri = /v1/system/ip-pools
124442025-03-07T23:12:29.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 229 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3483f600-0382-47d6-9510-7f5a7bb6afd6 response_code = 405 uri = /v1/system/ip-pools
124452025-03-07T23:12:29.792ZINFOtest_unauthorized (external client test context): client received response status = 405
124462025-03-07T23:12:29.792ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools
124472025-03-07T23:12:29.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools
124482025-03-07T23:12:29.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 41a75d30-c2a1-4349-9c7e-e1d74fb433bf uri = /v1/system/ip-pools
124492025-03-07T23:12:29.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 41a75d30-c2a1-4349-9c7e-e1d74fb433bf response_code = 405 uri = /v1/system/ip-pools
124502025-03-07T23:12:29.792ZINFOtest_unauthorized (external client test context): client received response status = 405
124512025-03-07T23:12:29.792ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools
124522025-03-07T23:12:29.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools
124532025-03-07T23:12:29.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b1c30084-db58-4585-85d4-59d949b6c7af uri = /v1/system/ip-pools
124542025-03-07T23:12:29.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b1c30084-db58-4585-85d4-59d949b6c7af response_code = 405 uri = /v1/system/ip-pools
124552025-03-07T23:12:29.793ZINFOtest_unauthorized (external client test context): client received response status = 405
124562025-03-07T23:12:29.793ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools
124572025-03-07T23:12:29.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools
124582025-03-07T23:12:29.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9ea829c2-464f-4899-acee-153ba493a8f5 uri = /v1/system/ip-pools
124592025-03-07T23:12:29.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9ea829c2-464f-4899-acee-153ba493a8f5 response_code = 405 uri = /v1/system/ip-pools
124602025-03-07T23:12:29.793ZINFOtest_unauthorized (external client test context): client received response status = 405
124612025-03-07T23:12:29.793ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools
124622025-03-07T23:12:29.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools
124632025-03-07T23:12:29.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 10db9329-c0a7-4eb9-8080-e7813a423bfc uri = /v1/system/ip-pools
124642025-03-07T23:12:29.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 10db9329-c0a7-4eb9-8080-e7813a423bfc response_code = 405 uri = /v1/system/ip-pools
124652025-03-07T23:12:29.793ZINFOtest_unauthorized (external client test context): client received response status = 405
124662025-03-07T23:12:29.793ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools
124672025-03-07T23:12:29.794ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools
124682025-03-07T23:12:29.794ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e4d58dc-8099-4c5c-a14c-783575a835b7 uri = /v1/system/ip-pools
124692025-03-07T23:12:29.797ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e4d58dc-8099-4c5c-a14c-783575a835b7 response_code = 405 uri = /v1/system/ip-pools
124702025-03-07T23:12:29.797ZINFOtest_unauthorized (external client test context): client received response status = 405
124712025-03-07T23:12:29.797ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools
124722025-03-07T23:12:29.797ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools
124732025-03-07T23:12:29.797ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 uri = /v1/system/ip-pools
124742025-03-07T23:12:29.797ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 uri = /v1/system/ip-pools
124752025-03-07T23:12:29.797ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
124762025-03-07T23:12:29.797ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124772025-03-07T23:12:29.797ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124782025-03-07T23:12:29.797ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124792025-03-07T23:12:29.798ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124802025-03-07T23:12:29.798ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124812025-03-07T23:12:29.798ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124822025-03-07T23:12:29.799ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
124832025-03-07T23:12:29.800ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
124842025-03-07T23:12:29.800ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124852025-03-07T23:12:29.800ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124862025-03-07T23:12:29.800ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124872025-03-07T23:12:29.802ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
124882025-03-07T23:12:29.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124892025-03-07T23:12:29.803ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124902025-03-07T23:12:29.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124912025-03-07T23:12:29.804ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
124922025-03-07T23:12:29.807ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
124932025-03-07T23:12:29.808ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124942025-03-07T23:12:29.809ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124952025-03-07T23:12:29.809ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124962025-03-07T23:12:29.810ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
124972025-03-07T23:12:29.810ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
124982025-03-07T23:12:29.810ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124992025-03-07T23:12:29.810ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125002025-03-07T23:12:29.811ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125012025-03-07T23:12:29.812ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
125022025-03-07T23:12:29.813ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125032025-03-07T23:12:29.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125042025-03-07T23:12:29.814ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125052025-03-07T23:12:29.815ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
125062025-03-07T23:12:29.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
125072025-03-07T23:12:29.818ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 uri = /v1/system/ip-pools
125082025-03-07T23:12:29.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = IpPoolList uri = /v1/system/ip-pools
125092025-03-07T23:12:29.818ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
125102025-03-07T23:12:29.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = Database uri = /v1/system/ip-pools
125112025-03-07T23:12:29.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
125122025-03-07T23:12:29.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = Database result = Ok(()) uri = /v1/system/ip-pools
125132025-03-07T23:12:29.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
125142025-03-07T23:12:29.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
125152025-03-07T23:12:29.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = Database uri = /v1/system/ip-pools
125162025-03-07T23:12:29.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
125172025-03-07T23:12:29.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 resource = Database result = Ok(()) uri = /v1/system/ip-pools
125182025-03-07T23:12:29.833ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 39619 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cbdb7269-807a-4c8b-a6b5-8fb13ceb9bf0 response_code = 200 uri = /v1/system/ip-pools
125192025-03-07T23:12:29.834ZINFOtest_unauthorized (external client test context): client received response status = 200
125202025-03-07T23:12:29.834ZINFOtest_unauthorized: test: begin endpoint url = /v1/ip-pools
125212025-03-07T23:12:29.834ZINFOtest_unauthorized: test: privileged GET url = /v1/ip-pools
125222025-03-07T23:12:29.834ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools
125232025-03-07T23:12:29.834ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f uri = /v1/ip-pools
125242025-03-07T23:12:29.834ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f uri = /v1/ip-pools
125252025-03-07T23:12:29.835ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools
125262025-03-07T23:12:29.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125272025-03-07T23:12:29.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125282025-03-07T23:12:29.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125292025-03-07T23:12:29.837ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125302025-03-07T23:12:29.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125312025-03-07T23:12:29.838ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125322025-03-07T23:12:29.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
125332025-03-07T23:12:29.840ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
125342025-03-07T23:12:29.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125352025-03-07T23:12:29.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125362025-03-07T23:12:29.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125372025-03-07T23:12:29.841ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
125382025-03-07T23:12:29.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125392025-03-07T23:12:29.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125402025-03-07T23:12:29.842ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125412025-03-07T23:12:29.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
125422025-03-07T23:12:29.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
125432025-03-07T23:12:29.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125442025-03-07T23:12:29.850ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125452025-03-07T23:12:29.850ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125462025-03-07T23:12:29.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
125472025-03-07T23:12:29.851ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
125482025-03-07T23:12:29.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125492025-03-07T23:12:29.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125502025-03-07T23:12:29.852ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125512025-03-07T23:12:29.857ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
125522025-03-07T23:12:29.858ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125532025-03-07T23:12:29.858ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125542025-03-07T23:12:29.858ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125552025-03-07T23:12:29.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
125562025-03-07T23:12:29.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
125572025-03-07T23:12:29.863ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f uri = /v1/ip-pools
125582025-03-07T23:12:29.863ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/ip-pools
125592025-03-07T23:12:29.864ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/ip-pools
125602025-03-07T23:12:29.865ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database uri = /v1/ip-pools
125612025-03-07T23:12:29.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f roles = RoleSet { roles: {} } uri = /v1/ip-pools
125622025-03-07T23:12:29.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database result = Ok(()) uri = /v1/ip-pools
125632025-03-07T23:12:29.867ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools
125642025-03-07T23:12:29.867ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database uri = /v1/ip-pools
125652025-03-07T23:12:29.867ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f roles = RoleSet { roles: {} } uri = /v1/ip-pools
125662025-03-07T23:12:29.868ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database result = Ok(()) uri = /v1/ip-pools
125672025-03-07T23:12:29.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools
125682025-03-07T23:12:29.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/ip-pools
125692025-03-07T23:12:29.876ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database uri = /v1/ip-pools
125702025-03-07T23:12:29.876ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f roles = RoleSet { roles: {} } uri = /v1/ip-pools
125712025-03-07T23:12:29.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f resource = Database result = Ok(()) uri = /v1/ip-pools
125722025-03-07T23:12:29.883ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 48682 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f9c0785c-5b17-4594-9938-439ca412a11f response_code = 200 uri = /v1/ip-pools
125732025-03-07T23:12:29.886ZINFOtest_unauthorized (external client test context): client received response status = 200
125742025-03-07T23:12:29.886ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/ip-pools
125752025-03-07T23:12:29.886ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/ip-pools
125762025-03-07T23:12:29.886ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools
125772025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 367d5269-38f7-470f-975a-1841731a5e74 uri = /v1/ip-pools
125782025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 367d5269-38f7-470f-975a-1841731a5e74 uri = /v1/ip-pools
125792025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 367d5269-38f7-470f-975a-1841731a5e74 uri = /v1/ip-pools
125802025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 367d5269-38f7-470f-975a-1841731a5e74 uri = /v1/ip-pools
125812025-03-07T23:12:29.887ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing IP pools: Actor required latency_us = 316 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 367d5269-38f7-470f-975a-1841731a5e74 response_code = 401 uri = /v1/ip-pools
125822025-03-07T23:12:29.887ZINFOtest_unauthorized (external client test context): client received response status = 401
125832025-03-07T23:12:29.887ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/ip-pools
125842025-03-07T23:12:29.887ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools
125852025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4417e2f9-52e1-4d40-92ee-a9a05e1a3e36 uri = /v1/ip-pools
125862025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4417e2f9-52e1-4d40-92ee-a9a05e1a3e36 uri = /v1/ip-pools
125872025-03-07T23:12:29.887ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4417e2f9-52e1-4d40-92ee-a9a05e1a3e36 uri = /v1/ip-pools
125882025-03-07T23:12:29.887ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 205 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4417e2f9-52e1-4d40-92ee-a9a05e1a3e36 response_code = 401 uri = /v1/ip-pools
125892025-03-07T23:12:29.888ZINFOtest_unauthorized (external client test context): client received response status = 401
125902025-03-07T23:12:29.888ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/ip-pools
125912025-03-07T23:12:29.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools
125922025-03-07T23:12:29.888ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 87c7c4fb-7c53-472c-87b1-470dd143b824 uri = /v1/ip-pools
125932025-03-07T23:12:29.888ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 87c7c4fb-7c53-472c-87b1-470dd143b824 uri = /v1/ip-pools
125942025-03-07T23:12:29.888ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1026:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1046:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 87c7c4fb-7c53-472c-87b1-470dd143b824 uri = /v1/ip-pools
125952025-03-07T23:12:29.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 953 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 87c7c4fb-7c53-472c-87b1-470dd143b824 response_code = 401 uri = /v1/ip-pools
125962025-03-07T23:12:29.888ZINFOtest_unauthorized (external client test context): client received response status = 401
125972025-03-07T23:12:29.888ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/ip-pools
125982025-03-07T23:12:29.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools
125992025-03-07T23:12:29.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3cfc4219-73cb-4212-90d3-9f8810a27aec uri = /v1/ip-pools
126002025-03-07T23:12:29.889ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3cfc4219-73cb-4212-90d3-9f8810a27aec response_code = 405 uri = /v1/ip-pools
126012025-03-07T23:12:29.889ZINFOtest_unauthorized (external client test context): client received response status = 405
126022025-03-07T23:12:29.889ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/ip-pools
126032025-03-07T23:12:29.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools
126042025-03-07T23:12:29.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = da725860-f93f-4423-b0da-9e0c46feb6b2 uri = /v1/ip-pools
126052025-03-07T23:12:29.889ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = da725860-f93f-4423-b0da-9e0c46feb6b2 response_code = 405 uri = /v1/ip-pools
126062025-03-07T23:12:29.889ZINFOtest_unauthorized (external client test context): client received response status = 405
126072025-03-07T23:12:29.889ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/ip-pools
126082025-03-07T23:12:29.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools
126092025-03-07T23:12:29.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 85389971-4053-4eca-83ab-d6afe48c7985 uri = /v1/ip-pools
126102025-03-07T23:12:29.889ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 85389971-4053-4eca-83ab-d6afe48c7985 response_code = 405 uri = /v1/ip-pools
126112025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client received response status = 405
126122025-03-07T23:12:29.890ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/ip-pools
126132025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools
126142025-03-07T23:12:29.890ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1a8dedbe-887d-4e37-aa8d-1552580ef5ec uri = /v1/ip-pools
126152025-03-07T23:12:29.890ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1a8dedbe-887d-4e37-aa8d-1552580ef5ec response_code = 405 uri = /v1/ip-pools
126162025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client received response status = 405
126172025-03-07T23:12:29.890ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/ip-pools
126182025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools
126192025-03-07T23:12:29.890ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = af9eaeeb-9431-4515-b8c4-790bec3fc28d uri = /v1/ip-pools
126202025-03-07T23:12:29.890ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = af9eaeeb-9431-4515-b8c4-790bec3fc28d response_code = 405 uri = /v1/ip-pools
126212025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client received response status = 405
126222025-03-07T23:12:29.890ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/ip-pools
126232025-03-07T23:12:29.890ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools
126242025-03-07T23:12:29.890ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee0349d3-1b69-4f3b-b1b5-f9934488737e uri = /v1/ip-pools
126252025-03-07T23:12:29.892ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee0349d3-1b69-4f3b-b1b5-f9934488737e response_code = 405 uri = /v1/ip-pools
126262025-03-07T23:12:29.892ZINFOtest_unauthorized (external client test context): client received response status = 405
126272025-03-07T23:12:29.892ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/ip-pools
126282025-03-07T23:12:29.892ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools
126292025-03-07T23:12:29.892ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c6e9f2d1-51e8-486f-8067-8a2277af8078 uri = /v1/ip-pools
126302025-03-07T23:12:29.892ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c6e9f2d1-51e8-486f-8067-8a2277af8078 response_code = 405 uri = /v1/ip-pools
126312025-03-07T23:12:29.893ZINFOtest_unauthorized (external client test context): client received response status = 405
126322025-03-07T23:12:29.893ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/ip-pools
126332025-03-07T23:12:29.893ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools
126342025-03-07T23:12:29.893ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 199bd20e-d9d5-44f8-8658-d6398200ebe3 uri = /v1/ip-pools
126352025-03-07T23:12:29.895ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 199bd20e-d9d5-44f8-8658-d6398200ebe3 response_code = 405 uri = /v1/ip-pools
126362025-03-07T23:12:29.895ZINFOtest_unauthorized (external client test context): client received response status = 405
126372025-03-07T23:12:29.895ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/ip-pools
126382025-03-07T23:12:29.895ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools
126392025-03-07T23:12:29.896ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4de541a3-ee8b-421e-8a01-26c92ef1b827 uri = /v1/ip-pools
126402025-03-07T23:12:29.896ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 33 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4de541a3-ee8b-421e-8a01-26c92ef1b827 response_code = 405 uri = /v1/ip-pools
126412025-03-07T23:12:29.896ZINFOtest_unauthorized (external client test context): client received response status = 405
126422025-03-07T23:12:29.896ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/ip-pools
126432025-03-07T23:12:29.896ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools
126442025-03-07T23:12:29.897ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6732c13-1477-4de5-84df-3033b5199a69 uri = /v1/ip-pools
126452025-03-07T23:12:29.897ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 33 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6732c13-1477-4de5-84df-3033b5199a69 response_code = 405 uri = /v1/ip-pools
126462025-03-07T23:12:29.897ZINFOtest_unauthorized (external client test context): client received response status = 405
126472025-03-07T23:12:29.897ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/ip-pools
126482025-03-07T23:12:29.898ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools
126492025-03-07T23:12:29.898ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e89fb2df-ecfa-495e-bfec-352b3fc77440 uri = /v1/ip-pools
126502025-03-07T23:12:29.898ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e89fb2df-ecfa-495e-bfec-352b3fc77440 response_code = 405 uri = /v1/ip-pools
126512025-03-07T23:12:29.899ZINFOtest_unauthorized (external client test context): client received response status = 405
126522025-03-07T23:12:29.899ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/ip-pools
126532025-03-07T23:12:29.899ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools
126542025-03-07T23:12:29.899ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4cb5526e-e1d6-4713-8f81-91b9dfe7e96f uri = /v1/ip-pools
126552025-03-07T23:12:29.899ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4cb5526e-e1d6-4713-8f81-91b9dfe7e96f response_code = 405 uri = /v1/ip-pools
126562025-03-07T23:12:29.899ZINFOtest_unauthorized (external client test context): client received response status = 405
126572025-03-07T23:12:29.899ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/ip-pools
126582025-03-07T23:12:29.899ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools
126592025-03-07T23:12:29.899ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 01dead9f-135a-4e9f-8719-56f375dfb8a5 uri = /v1/ip-pools
126602025-03-07T23:12:29.899ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 01dead9f-135a-4e9f-8719-56f375dfb8a5 response_code = 405 uri = /v1/ip-pools
126612025-03-07T23:12:29.899ZINFOtest_unauthorized (external client test context): client received response status = 405
126622025-03-07T23:12:29.900ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/ip-pools
126632025-03-07T23:12:29.900ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools
126642025-03-07T23:12:29.900ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e3b178d-42a3-4300-b386-66d83e9faabb uri = /v1/ip-pools
126652025-03-07T23:12:29.901ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e3b178d-42a3-4300-b386-66d83e9faabb response_code = 405 uri = /v1/ip-pools
126662025-03-07T23:12:29.901ZINFOtest_unauthorized (external client test context): client received response status = 405
126672025-03-07T23:12:29.901ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/ip-pools
126682025-03-07T23:12:29.901ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools
126692025-03-07T23:12:29.901ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3763cc7f-9d8b-417c-8d20-0cb7e5805c4a uri = /v1/ip-pools
126702025-03-07T23:12:29.901ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3763cc7f-9d8b-417c-8d20-0cb7e5805c4a response_code = 405 uri = /v1/ip-pools
126712025-03-07T23:12:29.901ZINFOtest_unauthorized (external client test context): client received response status = 405
126722025-03-07T23:12:29.901ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/ip-pools
126732025-03-07T23:12:29.901ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools
126742025-03-07T23:12:29.901ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d7f84021-ea25-477d-82c8-daa6848688d4 uri = /v1/ip-pools
126752025-03-07T23:12:29.901ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d7f84021-ea25-477d-82c8-daa6848688d4 response_code = 405 uri = /v1/ip-pools
126762025-03-07T23:12:29.901ZINFOtest_unauthorized (external client test context): client received response status = 405
126772025-03-07T23:12:29.901ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/ip-pools
126782025-03-07T23:12:29.902ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools
126792025-03-07T23:12:29.903ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e uri = /v1/ip-pools
126802025-03-07T23:12:29.903ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e uri = /v1/ip-pools
126812025-03-07T23:12:29.903ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools
126822025-03-07T23:12:29.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126832025-03-07T23:12:29.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126842025-03-07T23:12:29.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126852025-03-07T23:12:29.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126862025-03-07T23:12:29.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126872025-03-07T23:12:29.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126882025-03-07T23:12:29.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
126892025-03-07T23:12:29.905ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
126902025-03-07T23:12:29.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126912025-03-07T23:12:29.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126922025-03-07T23:12:29.905ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126932025-03-07T23:12:29.905ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
126942025-03-07T23:12:29.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126952025-03-07T23:12:29.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126962025-03-07T23:12:29.906ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126972025-03-07T23:12:29.908ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
126982025-03-07T23:12:29.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
126992025-03-07T23:12:29.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127002025-03-07T23:12:29.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127012025-03-07T23:12:29.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127022025-03-07T23:12:29.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
127032025-03-07T23:12:29.915ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
127042025-03-07T23:12:29.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127052025-03-07T23:12:29.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127062025-03-07T23:12:29.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127072025-03-07T23:12:29.917ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
127082025-03-07T23:12:29.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127092025-03-07T23:12:29.917ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127102025-03-07T23:12:29.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127112025-03-07T23:12:29.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
127122025-03-07T23:12:29.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
127132025-03-07T23:12:29.924ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e uri = /v1/ip-pools
127142025-03-07T23:12:29.924ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/ip-pools
127152025-03-07T23:12:29.926ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/ip-pools
127162025-03-07T23:12:29.926ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database uri = /v1/ip-pools
127172025-03-07T23:12:29.926ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e roles = RoleSet { roles: {} } uri = /v1/ip-pools
127182025-03-07T23:12:29.926ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database result = Ok(()) uri = /v1/ip-pools
127192025-03-07T23:12:29.927ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools
127202025-03-07T23:12:29.927ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database uri = /v1/ip-pools
127212025-03-07T23:12:29.927ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e roles = RoleSet { roles: {} } uri = /v1/ip-pools
127222025-03-07T23:12:29.928ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database result = Ok(()) uri = /v1/ip-pools
127232025-03-07T23:12:29.931ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools
127242025-03-07T23:12:29.935ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/ip-pools
127252025-03-07T23:12:29.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database uri = /v1/ip-pools
127262025-03-07T23:12:29.935ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e roles = RoleSet { roles: {} } uri = /v1/ip-pools
127272025-03-07T23:12:29.936ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e resource = Database result = Ok(()) uri = /v1/ip-pools
127282025-03-07T23:12:29.942ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 46931 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae11cf91-5d0d-4c6e-a29c-1f8eccd6196e response_code = 200 uri = /v1/ip-pools
127292025-03-07T23:12:29.943ZINFOtest_unauthorized (external client test context): client received response status = 200
127302025-03-07T23:12:29.943ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default
127312025-03-07T23:12:29.943ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default
127322025-03-07T23:12:29.943ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
127332025-03-07T23:12:29.943ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e uri = /v1/system/ip-pools/default
127342025-03-07T23:12:29.944ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e uri = /v1/system/ip-pools/default
127352025-03-07T23:12:29.944ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default
127362025-03-07T23:12:29.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127372025-03-07T23:12:29.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127382025-03-07T23:12:29.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127392025-03-07T23:12:29.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127402025-03-07T23:12:29.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127412025-03-07T23:12:29.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127422025-03-07T23:12:29.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
127432025-03-07T23:12:29.953ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
127442025-03-07T23:12:29.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127452025-03-07T23:12:29.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127462025-03-07T23:12:29.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127472025-03-07T23:12:29.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
127482025-03-07T23:12:29.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127492025-03-07T23:12:29.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127502025-03-07T23:12:29.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127512025-03-07T23:12:29.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
127522025-03-07T23:12:29.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
127532025-03-07T23:12:29.960ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127542025-03-07T23:12:29.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127552025-03-07T23:12:29.961ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127562025-03-07T23:12:29.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
127572025-03-07T23:12:29.962ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
127582025-03-07T23:12:29.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127592025-03-07T23:12:29.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127602025-03-07T23:12:29.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127612025-03-07T23:12:29.965ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
127622025-03-07T23:12:29.966ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127632025-03-07T23:12:29.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127642025-03-07T23:12:29.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127652025-03-07T23:12:29.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
127662025-03-07T23:12:29.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
127672025-03-07T23:12:29.969ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e uri = /v1/system/ip-pools/default
127682025-03-07T23:12:29.970ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = Database uri = /v1/system/ip-pools/default
127692025-03-07T23:12:29.970ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
127702025-03-07T23:12:29.970ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
127712025-03-07T23:12:29.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
127722025-03-07T23:12:29.972ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
127732025-03-07T23:12:29.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = Database uri = /v1/system/ip-pools/default
127742025-03-07T23:12:29.972ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
127752025-03-07T23:12:29.972ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
127762025-03-07T23:12:29.975ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default
127772025-03-07T23:12:29.980ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default
127782025-03-07T23:12:29.980ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 36816 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 203ff170-6879-4a11-9782-af33c751695e response_code = 200 uri = /v1/system/ip-pools/default
127792025-03-07T23:12:29.981ZINFOtest_unauthorized (external client test context): client received response status = 200
127802025-03-07T23:12:29.981ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default
127812025-03-07T23:12:29.981ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
127822025-03-07T23:12:29.982ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 uri = /v1/system/ip-pools/default
127832025-03-07T23:12:29.982ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 uri = /v1/system/ip-pools/default
127842025-03-07T23:12:29.982ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
127852025-03-07T23:12:29.982ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127862025-03-07T23:12:29.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127872025-03-07T23:12:29.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127882025-03-07T23:12:29.983ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127892025-03-07T23:12:29.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127902025-03-07T23:12:29.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127912025-03-07T23:12:29.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
127922025-03-07T23:12:29.986ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
127932025-03-07T23:12:29.986ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127942025-03-07T23:12:29.986ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127952025-03-07T23:12:29.986ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
127962025-03-07T23:12:29.987ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
127972025-03-07T23:12:29.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
127982025-03-07T23:12:29.988ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
127992025-03-07T23:12:29.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128002025-03-07T23:12:29.989ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128012025-03-07T23:12:29.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
128022025-03-07T23:12:29.992ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128032025-03-07T23:12:29.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128042025-03-07T23:12:29.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128052025-03-07T23:12:29.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
128062025-03-07T23:12:29.994ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128072025-03-07T23:12:29.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128082025-03-07T23:12:29.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128092025-03-07T23:12:29.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128102025-03-07T23:12:29.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128112025-03-07T23:12:29.996ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128122025-03-07T23:12:29.996ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128132025-03-07T23:12:29.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128142025-03-07T23:12:29.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128152025-03-07T23:12:30.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
128162025-03-07T23:12:30.002ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 uri = /v1/system/ip-pools/default
128172025-03-07T23:12:30.002ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = Database uri = /v1/system/ip-pools/default
128182025-03-07T23:12:30.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128192025-03-07T23:12:30.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
128202025-03-07T23:12:30.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
128212025-03-07T23:12:30.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
128222025-03-07T23:12:30.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = Database uri = /v1/system/ip-pools/default
128232025-03-07T23:12:30.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128242025-03-07T23:12:30.005ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
128252025-03-07T23:12:30.011ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128262025-03-07T23:12:30.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
128272025-03-07T23:12:30.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 33617 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8faf5abf-372e-4b7c-b974-c4a038d96b83 response_code = 404 uri = /v1/system/ip-pools/default
128282025-03-07T23:12:30.016ZINFOtest_unauthorized (external client test context): client received response status = 404
128292025-03-07T23:12:30.016ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default
128302025-03-07T23:12:30.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
128312025-03-07T23:12:30.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 uri = /v1/system/ip-pools/default
128322025-03-07T23:12:30.017ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 uri = /v1/system/ip-pools/default
128332025-03-07T23:12:30.017ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 uri = /v1/system/ip-pools/default
128342025-03-07T23:12:30.017ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 uri = /v1/system/ip-pools/default
128352025-03-07T23:12:30.017ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 resource = Database uri = /v1/system/ip-pools/default
128362025-03-07T23:12:30.017ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128372025-03-07T23:12:30.017ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
128382025-03-07T23:12:30.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1123 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 69a34766-5054-4ca1-a2e8-d83671259791 response_code = 401 uri = /v1/system/ip-pools/default
128392025-03-07T23:12:30.018ZINFOtest_unauthorized (external client test context): client received response status = 401
128402025-03-07T23:12:30.018ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default
128412025-03-07T23:12:30.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
128422025-03-07T23:12:30.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ef50272-f2e5-44b0-8215-c57e72790d9c uri = /v1/system/ip-pools/default
128432025-03-07T23:12:30.018ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ef50272-f2e5-44b0-8215-c57e72790d9c uri = /v1/system/ip-pools/default
128442025-03-07T23:12:30.018ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ef50272-f2e5-44b0-8215-c57e72790d9c uri = /v1/system/ip-pools/default
128452025-03-07T23:12:30.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 201 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ef50272-f2e5-44b0-8215-c57e72790d9c response_code = 401 uri = /v1/system/ip-pools/default
128462025-03-07T23:12:30.019ZINFOtest_unauthorized (external client test context): client received response status = 401
128472025-03-07T23:12:30.020ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default
128482025-03-07T23:12:30.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
128492025-03-07T23:12:30.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fc5b349-6aac-4406-a21b-d87f00ef1ab3 uri = /v1/system/ip-pools/default
128502025-03-07T23:12:30.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fc5b349-6aac-4406-a21b-d87f00ef1ab3 uri = /v1/system/ip-pools/default
128512025-03-07T23:12:30.020ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1132:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1145:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fc5b349-6aac-4406-a21b-d87f00ef1ab3 uri = /v1/system/ip-pools/default
128522025-03-07T23:12:30.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 845 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8fc5b349-6aac-4406-a21b-d87f00ef1ab3 response_code = 401 uri = /v1/system/ip-pools/default
128532025-03-07T23:12:30.020ZINFOtest_unauthorized (external client test context): client received response status = 401
128542025-03-07T23:12:30.021ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default
128552025-03-07T23:12:30.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default
128562025-03-07T23:12:30.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a uri = /v1/system/ip-pools/default
128572025-03-07T23:12:30.022ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a uri = /v1/system/ip-pools/default
128582025-03-07T23:12:30.022ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
128592025-03-07T23:12:30.022ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128602025-03-07T23:12:30.022ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128612025-03-07T23:12:30.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128622025-03-07T23:12:30.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128632025-03-07T23:12:30.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128642025-03-07T23:12:30.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128652025-03-07T23:12:30.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
128662025-03-07T23:12:30.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128672025-03-07T23:12:30.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128682025-03-07T23:12:30.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128692025-03-07T23:12:30.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128702025-03-07T23:12:30.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128712025-03-07T23:12:30.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128722025-03-07T23:12:30.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128732025-03-07T23:12:30.031ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128742025-03-07T23:12:30.032ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128752025-03-07T23:12:30.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
128762025-03-07T23:12:30.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128772025-03-07T23:12:30.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128782025-03-07T23:12:30.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128792025-03-07T23:12:30.037ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
128802025-03-07T23:12:30.037ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128812025-03-07T23:12:30.037ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128822025-03-07T23:12:30.037ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128832025-03-07T23:12:30.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128842025-03-07T23:12:30.039ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128852025-03-07T23:12:30.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128862025-03-07T23:12:30.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128872025-03-07T23:12:30.040ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128882025-03-07T23:12:30.041ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128892025-03-07T23:12:30.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
128902025-03-07T23:12:30.045ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a uri = /v1/system/ip-pools/default
128912025-03-07T23:12:30.045ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = Database uri = /v1/system/ip-pools/default
128922025-03-07T23:12:30.045ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128932025-03-07T23:12:30.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
128942025-03-07T23:12:30.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
128952025-03-07T23:12:30.047ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
128962025-03-07T23:12:30.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = Database uri = /v1/system/ip-pools/default
128972025-03-07T23:12:30.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
128982025-03-07T23:12:30.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
128992025-03-07T23:12:30.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129002025-03-07T23:12:30.058ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
129012025-03-07T23:12:30.059ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 38040 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ada3295-0c7a-4c87-8d87-6840a584a66a response_code = 404 uri = /v1/system/ip-pools/default
129022025-03-07T23:12:30.059ZINFOtest_unauthorized (external client test context): client received response status = 404
129032025-03-07T23:12:30.059ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default
129042025-03-07T23:12:30.059ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129052025-03-07T23:12:30.059ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 uri = /v1/system/ip-pools/default
129062025-03-07T23:12:30.060ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 uri = /v1/system/ip-pools/default
129072025-03-07T23:12:30.060ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 uri = /v1/system/ip-pools/default
129082025-03-07T23:12:30.060ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 uri = /v1/system/ip-pools/default
129092025-03-07T23:12:30.060ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 resource = Database uri = /v1/system/ip-pools/default
129102025-03-07T23:12:30.060ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129112025-03-07T23:12:30.060ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
129122025-03-07T23:12:30.061ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 784 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c75ccb2f-560a-4737-aabe-f9b91ed4a537 response_code = 401 uri = /v1/system/ip-pools/default
129132025-03-07T23:12:30.061ZINFOtest_unauthorized (external client test context): client received response status = 401
129142025-03-07T23:12:30.061ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default
129152025-03-07T23:12:30.061ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129162025-03-07T23:12:30.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 10c443b1-7e9b-4012-adf6-f02a5559efdb uri = /v1/system/ip-pools/default
129172025-03-07T23:12:30.062ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 10c443b1-7e9b-4012-adf6-f02a5559efdb uri = /v1/system/ip-pools/default
129182025-03-07T23:12:30.062ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 10c443b1-7e9b-4012-adf6-f02a5559efdb uri = /v1/system/ip-pools/default
129192025-03-07T23:12:30.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 224 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 10c443b1-7e9b-4012-adf6-f02a5559efdb response_code = 401 uri = /v1/system/ip-pools/default
129202025-03-07T23:12:30.062ZINFOtest_unauthorized (external client test context): client received response status = 401
129212025-03-07T23:12:30.062ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default
129222025-03-07T23:12:30.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129232025-03-07T23:12:30.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ea344cff-0193-4943-b916-db70d14eb2ec uri = /v1/system/ip-pools/default
129242025-03-07T23:12:30.062ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ea344cff-0193-4943-b916-db70d14eb2ec uri = /v1/system/ip-pools/default
129252025-03-07T23:12:30.073ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1177:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1190:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ea344cff-0193-4943-b916-db70d14eb2ec uri = /v1/system/ip-pools/default
129262025-03-07T23:12:30.073ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 832 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ea344cff-0193-4943-b916-db70d14eb2ec response_code = 401 uri = /v1/system/ip-pools/default
129272025-03-07T23:12:30.073ZINFOtest_unauthorized (external client test context): client received response status = 401
129282025-03-07T23:12:30.073ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default
129292025-03-07T23:12:30.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129302025-03-07T23:12:30.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3be09981-19f5-44aa-ac1f-86028d6f4b6d uri = /v1/system/ip-pools/default
129312025-03-07T23:12:30.073ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3be09981-19f5-44aa-ac1f-86028d6f4b6d response_code = 405 uri = /v1/system/ip-pools/default
129322025-03-07T23:12:30.073ZINFOtest_unauthorized (external client test context): client received response status = 405
129332025-03-07T23:12:30.073ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default
129342025-03-07T23:12:30.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129352025-03-07T23:12:30.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4b33dbc6-5eec-4c76-a9bc-f15d857b020d uri = /v1/system/ip-pools/default
129362025-03-07T23:12:30.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4b33dbc6-5eec-4c76-a9bc-f15d857b020d response_code = 405 uri = /v1/system/ip-pools/default
129372025-03-07T23:12:30.075ZINFOtest_unauthorized (external client test context): client received response status = 405
129382025-03-07T23:12:30.075ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default
129392025-03-07T23:12:30.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129402025-03-07T23:12:30.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 81d5efd5-ea6b-4fe1-bf05-e1b5b6dfdeeb uri = /v1/system/ip-pools/default
129412025-03-07T23:12:30.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 81d5efd5-ea6b-4fe1-bf05-e1b5b6dfdeeb response_code = 405 uri = /v1/system/ip-pools/default
129422025-03-07T23:12:30.075ZINFOtest_unauthorized (external client test context): client received response status = 405
129432025-03-07T23:12:30.075ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default
129442025-03-07T23:12:30.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129452025-03-07T23:12:30.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = edd8bdd6-d978-4c9a-951f-5c078783731e uri = /v1/system/ip-pools/default
129462025-03-07T23:12:30.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = edd8bdd6-d978-4c9a-951f-5c078783731e response_code = 405 uri = /v1/system/ip-pools/default
129472025-03-07T23:12:30.075ZINFOtest_unauthorized (external client test context): client received response status = 405
129482025-03-07T23:12:30.077ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default
129492025-03-07T23:12:30.077ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129502025-03-07T23:12:30.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad uri = /v1/system/ip-pools/default
129512025-03-07T23:12:30.077ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad uri = /v1/system/ip-pools/default
129522025-03-07T23:12:30.077ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
129532025-03-07T23:12:30.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129542025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129552025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129562025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129572025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129582025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129592025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
129602025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
129612025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129622025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129632025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129642025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
129652025-03-07T23:12:30.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129662025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129672025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129682025-03-07T23:12:30.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
129692025-03-07T23:12:30.082ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
129702025-03-07T23:12:30.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129712025-03-07T23:12:30.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129722025-03-07T23:12:30.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129732025-03-07T23:12:30.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
129742025-03-07T23:12:30.084ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
129752025-03-07T23:12:30.085ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129762025-03-07T23:12:30.085ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129772025-03-07T23:12:30.085ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129782025-03-07T23:12:30.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
129792025-03-07T23:12:30.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129802025-03-07T23:12:30.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129812025-03-07T23:12:30.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129822025-03-07T23:12:30.089ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
129832025-03-07T23:12:30.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
129842025-03-07T23:12:30.091ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad uri = /v1/system/ip-pools/default
129852025-03-07T23:12:30.091ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = Database uri = /v1/system/ip-pools/default
129862025-03-07T23:12:30.091ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129872025-03-07T23:12:30.094ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129882025-03-07T23:12:30.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
129892025-03-07T23:12:30.094ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
129902025-03-07T23:12:30.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = Database uri = /v1/system/ip-pools/default
129912025-03-07T23:12:30.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129922025-03-07T23:12:30.095ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129932025-03-07T23:12:30.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129942025-03-07T23:12:30.108ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
129952025-03-07T23:12:30.108ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 43211 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33b9be90-141c-4c20-b5fc-ad1320b853ad response_code = 404 uri = /v1/system/ip-pools/default
129962025-03-07T23:12:30.111ZINFOtest_unauthorized (external client test context): client received response status = 404
129972025-03-07T23:12:30.111ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default
129982025-03-07T23:12:30.111ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
129992025-03-07T23:12:30.111ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b uri = /v1/system/ip-pools/default
130002025-03-07T23:12:30.111ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b uri = /v1/system/ip-pools/default
130012025-03-07T23:12:30.111ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b uri = /v1/system/ip-pools/default
130022025-03-07T23:12:30.111ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b uri = /v1/system/ip-pools/default
130032025-03-07T23:12:30.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b resource = Database uri = /v1/system/ip-pools/default
130042025-03-07T23:12:30.111ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130052025-03-07T23:12:30.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
130062025-03-07T23:12:30.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 647 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = da418230-1c08-4498-b8d7-b22113c4d91b response_code = 401 uri = /v1/system/ip-pools/default
130072025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client received response status = 401
130082025-03-07T23:12:30.112ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default
130092025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130102025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7b1cc5ad-996b-4145-ad5f-84f9d5d8b7db uri = /v1/system/ip-pools/default
130112025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7b1cc5ad-996b-4145-ad5f-84f9d5d8b7db uri = /v1/system/ip-pools/default
130122025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7b1cc5ad-996b-4145-ad5f-84f9d5d8b7db uri = /v1/system/ip-pools/default
130132025-03-07T23:12:30.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 169 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7b1cc5ad-996b-4145-ad5f-84f9d5d8b7db response_code = 401 uri = /v1/system/ip-pools/default
130142025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client received response status = 401
130152025-03-07T23:12:30.112ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default
130162025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130172025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 64f7a4c2-66a4-4381-8bcb-d361dc93d3fc uri = /v1/system/ip-pools/default
130182025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 64f7a4c2-66a4-4381-8bcb-d361dc93d3fc uri = /v1/system/ip-pools/default
130192025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1155:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1166:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 64f7a4c2-66a4-4381-8bcb-d361dc93d3fc uri = /v1/system/ip-pools/default
130202025-03-07T23:12:30.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 907 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 64f7a4c2-66a4-4381-8bcb-d361dc93d3fc response_code = 401 uri = /v1/system/ip-pools/default
130212025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client received response status = 401
130222025-03-07T23:12:30.112ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default
130232025-03-07T23:12:30.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130242025-03-07T23:12:30.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6fe3ce15-13f0-491e-873d-1a27a29744cb uri = /v1/system/ip-pools/default
130252025-03-07T23:12:30.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6fe3ce15-13f0-491e-873d-1a27a29744cb response_code = 405 uri = /v1/system/ip-pools/default
130262025-03-07T23:12:30.113ZINFOtest_unauthorized (external client test context): client received response status = 405
130272025-03-07T23:12:30.113ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default
130282025-03-07T23:12:30.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130292025-03-07T23:12:30.113ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2c6c18c8-a080-40ef-acac-e373771cd302 uri = /v1/system/ip-pools/default
130302025-03-07T23:12:30.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2c6c18c8-a080-40ef-acac-e373771cd302 response_code = 405 uri = /v1/system/ip-pools/default
130312025-03-07T23:12:30.113ZINFOtest_unauthorized (external client test context): client received response status = 405
130322025-03-07T23:12:30.114ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default
130332025-03-07T23:12:30.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130342025-03-07T23:12:30.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1e5967aa-608d-4dd4-b99f-89eb4cc10531 uri = /v1/system/ip-pools/default
130352025-03-07T23:12:30.114ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1e5967aa-608d-4dd4-b99f-89eb4cc10531 response_code = 405 uri = /v1/system/ip-pools/default
130362025-03-07T23:12:30.114ZINFOtest_unauthorized (external client test context): client received response status = 405
130372025-03-07T23:12:30.114ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default
130382025-03-07T23:12:30.115ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130392025-03-07T23:12:30.115ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 350d06de-974d-462e-a08c-a995cc948da8 uri = /v1/system/ip-pools/default
130402025-03-07T23:12:30.115ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 350d06de-974d-462e-a08c-a995cc948da8 response_code = 405 uri = /v1/system/ip-pools/default
130412025-03-07T23:12:30.115ZINFOtest_unauthorized (external client test context): client received response status = 405
130422025-03-07T23:12:30.115ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default
130432025-03-07T23:12:30.117ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default
130442025-03-07T23:12:30.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c uri = /v1/system/ip-pools/default
130452025-03-07T23:12:30.118ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c uri = /v1/system/ip-pools/default
130462025-03-07T23:12:30.118ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default
130472025-03-07T23:12:30.118ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130482025-03-07T23:12:30.118ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130492025-03-07T23:12:30.118ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130502025-03-07T23:12:30.122ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130512025-03-07T23:12:30.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130522025-03-07T23:12:30.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130532025-03-07T23:12:30.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
130542025-03-07T23:12:30.126ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
130552025-03-07T23:12:30.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130562025-03-07T23:12:30.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130572025-03-07T23:12:30.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130582025-03-07T23:12:30.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
130592025-03-07T23:12:30.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130602025-03-07T23:12:30.140ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130612025-03-07T23:12:30.140ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130622025-03-07T23:12:30.140ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
130632025-03-07T23:12:30.142ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
130642025-03-07T23:12:30.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130652025-03-07T23:12:30.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130662025-03-07T23:12:30.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130672025-03-07T23:12:30.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
130682025-03-07T23:12:30.145ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
130692025-03-07T23:12:30.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130702025-03-07T23:12:30.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130712025-03-07T23:12:30.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130722025-03-07T23:12:30.152ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
130732025-03-07T23:12:30.153ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130742025-03-07T23:12:30.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130752025-03-07T23:12:30.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130762025-03-07T23:12:30.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
130772025-03-07T23:12:30.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
130782025-03-07T23:12:30.159ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c uri = /v1/system/ip-pools/default
130792025-03-07T23:12:30.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = Database uri = /v1/system/ip-pools/default
130802025-03-07T23:12:30.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130812025-03-07T23:12:30.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
130822025-03-07T23:12:30.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
130832025-03-07T23:12:30.161ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
130842025-03-07T23:12:30.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = Database uri = /v1/system/ip-pools/default
130852025-03-07T23:12:30.162ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130862025-03-07T23:12:30.162ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
130872025-03-07T23:12:30.166ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default
130882025-03-07T23:12:30.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default
130892025-03-07T23:12:30.174ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 58720 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4f8189a1-dc9f-4f96-ab9f-f13b1fce6d8c response_code = 200 uri = /v1/system/ip-pools/default
130902025-03-07T23:12:30.174ZINFOtest_unauthorized (external client test context): client received response status = 200
130912025-03-07T23:12:30.174ZINFOtest_unauthorized: test: begin endpoint url = /v1/ip-pools/default?project=demo-project
130922025-03-07T23:12:30.174ZINFOtest_unauthorized: test: privileged GET url = /v1/ip-pools/default?project=demo-project
130932025-03-07T23:12:30.174ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
130942025-03-07T23:12:30.174ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 uri = /v1/ip-pools/default?project=demo-project
130952025-03-07T23:12:30.174ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 uri = /v1/ip-pools/default?project=demo-project
130962025-03-07T23:12:30.174ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools/default?project=demo-project
130972025-03-07T23:12:30.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130982025-03-07T23:12:30.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130992025-03-07T23:12:30.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131002025-03-07T23:12:30.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131012025-03-07T23:12:30.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131022025-03-07T23:12:30.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131032025-03-07T23:12:30.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
131042025-03-07T23:12:30.181ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
131052025-03-07T23:12:30.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131062025-03-07T23:12:30.181ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131072025-03-07T23:12:30.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131082025-03-07T23:12:30.189ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
131092025-03-07T23:12:30.189ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131102025-03-07T23:12:30.189ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131112025-03-07T23:12:30.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131122025-03-07T23:12:30.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
131132025-03-07T23:12:30.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
131142025-03-07T23:12:30.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131152025-03-07T23:12:30.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131162025-03-07T23:12:30.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131172025-03-07T23:12:30.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
131182025-03-07T23:12:30.208ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
131192025-03-07T23:12:30.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131202025-03-07T23:12:30.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131212025-03-07T23:12:30.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131222025-03-07T23:12:30.211ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
131232025-03-07T23:12:30.211ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131242025-03-07T23:12:30.211ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131252025-03-07T23:12:30.212ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131262025-03-07T23:12:30.214ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
131272025-03-07T23:12:30.218ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
131282025-03-07T23:12:30.219ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 uri = /v1/ip-pools/default?project=demo-project
131292025-03-07T23:12:30.219ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database uri = /v1/ip-pools/default?project=demo-project
131302025-03-07T23:12:30.219ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
131312025-03-07T23:12:30.220ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
131322025-03-07T23:12:30.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
131332025-03-07T23:12:30.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
131342025-03-07T23:12:30.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
131352025-03-07T23:12:30.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
131362025-03-07T23:12:30.226ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/ip-pools/default?project=demo-project
131372025-03-07T23:12:30.227ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools/default?project=demo-project
131382025-03-07T23:12:30.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database uri = /v1/ip-pools/default?project=demo-project
131392025-03-07T23:12:30.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
131402025-03-07T23:12:30.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
131412025-03-07T23:12:30.230ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
131422025-03-07T23:12:30.230ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
131432025-03-07T23:12:30.233ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
131442025-03-07T23:12:30.233ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
131452025-03-07T23:12:30.236ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools/default?project=demo-project
131462025-03-07T23:12:30.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
131472025-03-07T23:12:30.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database uri = /v1/ip-pools/default?project=demo-project
131482025-03-07T23:12:30.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
131492025-03-07T23:12:30.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
131502025-03-07T23:12:30.246ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 72032 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b365c3bc-d4d9-41a1-8db3-5d94da928e45 response_code = 200 uri = /v1/ip-pools/default?project=demo-project
131512025-03-07T23:12:30.247ZINFOtest_unauthorized (external client test context): client received response status = 200
131522025-03-07T23:12:30.247ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/ip-pools/default?project=demo-project
131532025-03-07T23:12:30.247ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/ip-pools/default?project=demo-project
131542025-03-07T23:12:30.247ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131552025-03-07T23:12:30.248ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 uri = /v1/ip-pools/default?project=demo-project
131562025-03-07T23:12:30.248ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 uri = /v1/ip-pools/default?project=demo-project
131572025-03-07T23:12:30.248ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 uri = /v1/ip-pools/default?project=demo-project
131582025-03-07T23:12:30.248ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 uri = /v1/ip-pools/default?project=demo-project
131592025-03-07T23:12:30.248ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 resource = Database uri = /v1/ip-pools/default?project=demo-project
131602025-03-07T23:12:30.248ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
131612025-03-07T23:12:30.249ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/ip-pools/default?project=demo-project
131622025-03-07T23:12:30.249ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1687 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5d2a86c7-f10f-4b45-a82c-b08f4f500898 response_code = 401 uri = /v1/ip-pools/default?project=demo-project
131632025-03-07T23:12:30.250ZINFOtest_unauthorized (external client test context): client received response status = 401
131642025-03-07T23:12:30.250ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/ip-pools/default?project=demo-project
131652025-03-07T23:12:30.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131662025-03-07T23:12:30.250ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2b9d258b-62a1-4268-8e59-10f62f91e9ab uri = /v1/ip-pools/default?project=demo-project
131672025-03-07T23:12:30.250ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2b9d258b-62a1-4268-8e59-10f62f91e9ab uri = /v1/ip-pools/default?project=demo-project
131682025-03-07T23:12:30.250ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2b9d258b-62a1-4268-8e59-10f62f91e9ab uri = /v1/ip-pools/default?project=demo-project
131692025-03-07T23:12:30.250ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 313 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2b9d258b-62a1-4268-8e59-10f62f91e9ab response_code = 401 uri = /v1/ip-pools/default?project=demo-project
131702025-03-07T23:12:30.250ZINFOtest_unauthorized (external client test context): client received response status = 401
131712025-03-07T23:12:30.251ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/ip-pools/default?project=demo-project
131722025-03-07T23:12:30.251ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131732025-03-07T23:12:30.251ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216a1c17-d577-487b-9e91-b0a3e1bbecf5 uri = /v1/ip-pools/default?project=demo-project
131742025-03-07T23:12:30.251ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216a1c17-d577-487b-9e91-b0a3e1bbecf5 uri = /v1/ip-pools/default?project=demo-project
131752025-03-07T23:12:30.252ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1056:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1070:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216a1c17-d577-487b-9e91-b0a3e1bbecf5 uri = /v1/ip-pools/default?project=demo-project
131762025-03-07T23:12:30.252ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 893 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216a1c17-d577-487b-9e91-b0a3e1bbecf5 response_code = 401 uri = /v1/ip-pools/default?project=demo-project
131772025-03-07T23:12:30.252ZINFOtest_unauthorized (external client test context): client received response status = 401
131782025-03-07T23:12:30.252ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/ip-pools/default?project=demo-project
131792025-03-07T23:12:30.252ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131802025-03-07T23:12:30.252ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 261f6e8b-ff41-4d01-8376-2b4540523514 uri = /v1/ip-pools/default?project=demo-project
131812025-03-07T23:12:30.252ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 261f6e8b-ff41-4d01-8376-2b4540523514 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
131822025-03-07T23:12:30.253ZINFOtest_unauthorized (external client test context): client received response status = 405
131832025-03-07T23:12:30.253ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/ip-pools/default?project=demo-project
131842025-03-07T23:12:30.253ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131852025-03-07T23:12:30.253ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e10123c8-321c-4a72-be8c-27e02d4c6359 uri = /v1/ip-pools/default?project=demo-project
131862025-03-07T23:12:30.253ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e10123c8-321c-4a72-be8c-27e02d4c6359 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
131872025-03-07T23:12:30.253ZINFOtest_unauthorized (external client test context): client received response status = 405
131882025-03-07T23:12:30.253ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/ip-pools/default?project=demo-project
131892025-03-07T23:12:30.253ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131902025-03-07T23:12:30.254ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = af18575f-2f2a-4553-b046-ab8b4ed4add4 uri = /v1/ip-pools/default?project=demo-project
131912025-03-07T23:12:30.254ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = af18575f-2f2a-4553-b046-ab8b4ed4add4 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
131922025-03-07T23:12:30.254ZINFOtest_unauthorized (external client test context): client received response status = 405
131932025-03-07T23:12:30.254ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/ip-pools/default?project=demo-project
131942025-03-07T23:12:30.254ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
131952025-03-07T23:12:30.254ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 79b294f9-0465-4fd5-ba97-efb35f49b432 uri = /v1/ip-pools/default?project=demo-project
131962025-03-07T23:12:30.254ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 79b294f9-0465-4fd5-ba97-efb35f49b432 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
131972025-03-07T23:12:30.254ZINFOtest_unauthorized (external client test context): client received response status = 405
131982025-03-07T23:12:30.255ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/ip-pools/default?project=demo-project
131992025-03-07T23:12:30.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132002025-03-07T23:12:30.255ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87d10a6d-9589-4d13-8f2c-884000ab27f8 uri = /v1/ip-pools/default?project=demo-project
132012025-03-07T23:12:30.255ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 166 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87d10a6d-9589-4d13-8f2c-884000ab27f8 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132022025-03-07T23:12:30.255ZINFOtest_unauthorized (external client test context): client received response status = 405
132032025-03-07T23:12:30.255ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/ip-pools/default?project=demo-project
132042025-03-07T23:12:30.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132052025-03-07T23:12:30.256ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c4d21431-6a0d-4bd1-a28f-4a5f632001f5 uri = /v1/ip-pools/default?project=demo-project
132062025-03-07T23:12:30.256ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 161 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c4d21431-6a0d-4bd1-a28f-4a5f632001f5 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132072025-03-07T23:12:30.256ZINFOtest_unauthorized (external client test context): client received response status = 405
132082025-03-07T23:12:30.256ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/ip-pools/default?project=demo-project
132092025-03-07T23:12:30.257ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132102025-03-07T23:12:30.257ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e54da908-1d9b-4a56-9dcc-051712fc8931 uri = /v1/ip-pools/default?project=demo-project
132112025-03-07T23:12:30.257ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 161 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e54da908-1d9b-4a56-9dcc-051712fc8931 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132122025-03-07T23:12:30.257ZINFOtest_unauthorized (external client test context): client received response status = 405
132132025-03-07T23:12:30.258ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/ip-pools/default?project=demo-project
132142025-03-07T23:12:30.258ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132152025-03-07T23:12:30.258ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a9bd8180-410f-438b-9cc5-63a4dc782065 uri = /v1/ip-pools/default?project=demo-project
132162025-03-07T23:12:30.258ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 184 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a9bd8180-410f-438b-9cc5-63a4dc782065 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132172025-03-07T23:12:30.258ZINFOtest_unauthorized (external client test context): client received response status = 405
132182025-03-07T23:12:30.259ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/ip-pools/default?project=demo-project
132192025-03-07T23:12:30.259ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132202025-03-07T23:12:30.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2ab853a-0c9c-41dd-a56f-e7ddd6752482 uri = /v1/ip-pools/default?project=demo-project
132212025-03-07T23:12:30.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 202 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2ab853a-0c9c-41dd-a56f-e7ddd6752482 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132222025-03-07T23:12:30.260ZINFOtest_unauthorized (external client test context): client received response status = 405
132232025-03-07T23:12:30.260ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/ip-pools/default?project=demo-project
132242025-03-07T23:12:30.260ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132252025-03-07T23:12:30.260ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fd00ef3b-1095-47c0-8b2a-fdecff230220 uri = /v1/ip-pools/default?project=demo-project
132262025-03-07T23:12:30.260ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 156 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fd00ef3b-1095-47c0-8b2a-fdecff230220 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132272025-03-07T23:12:30.261ZINFOtest_unauthorized (external client test context): client received response status = 405
132282025-03-07T23:12:30.261ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/ip-pools/default?project=demo-project
132292025-03-07T23:12:30.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132302025-03-07T23:12:30.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45f46828-d800-480c-83a9-42ca7ce35df1 uri = /v1/ip-pools/default?project=demo-project
132312025-03-07T23:12:30.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 167 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45f46828-d800-480c-83a9-42ca7ce35df1 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132322025-03-07T23:12:30.262ZINFOtest_unauthorized (external client test context): client received response status = 405
132332025-03-07T23:12:30.262ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/ip-pools/default?project=demo-project
132342025-03-07T23:12:30.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132352025-03-07T23:12:30.262ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9c1d54c3-a873-4108-9db5-8edcdf345ee4 uri = /v1/ip-pools/default?project=demo-project
132362025-03-07T23:12:30.262ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 157 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9c1d54c3-a873-4108-9db5-8edcdf345ee4 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132372025-03-07T23:12:30.263ZINFOtest_unauthorized (external client test context): client received response status = 405
132382025-03-07T23:12:30.263ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/ip-pools/default?project=demo-project
132392025-03-07T23:12:30.263ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132402025-03-07T23:12:30.263ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3e11b825-873c-4213-a816-80380f52fa97 uri = /v1/ip-pools/default?project=demo-project
132412025-03-07T23:12:30.263ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 160 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3e11b825-873c-4213-a816-80380f52fa97 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132422025-03-07T23:12:30.264ZINFOtest_unauthorized (external client test context): client received response status = 405
132432025-03-07T23:12:30.264ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/ip-pools/default?project=demo-project
132442025-03-07T23:12:30.264ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132452025-03-07T23:12:30.264ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5a17cfd2-05dc-45d1-b592-2323c947d0ae uri = /v1/ip-pools/default?project=demo-project
132462025-03-07T23:12:30.265ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5a17cfd2-05dc-45d1-b592-2323c947d0ae response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132472025-03-07T23:12:30.265ZINFOtest_unauthorized (external client test context): client received response status = 405
132482025-03-07T23:12:30.265ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/ip-pools/default?project=demo-project
132492025-03-07T23:12:30.265ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132502025-03-07T23:12:30.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bd58bd11-de2c-4c5f-b2be-035135258d5e uri = /v1/ip-pools/default?project=demo-project
132512025-03-07T23:12:30.266ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bd58bd11-de2c-4c5f-b2be-035135258d5e response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132522025-03-07T23:12:30.266ZINFOtest_unauthorized (external client test context): client received response status = 405
132532025-03-07T23:12:30.266ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/ip-pools/default?project=demo-project
132542025-03-07T23:12:30.266ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132552025-03-07T23:12:30.267ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 564484de-7ab3-4be3-9fd3-4145970cbc7e uri = /v1/ip-pools/default?project=demo-project
132562025-03-07T23:12:30.267ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 164 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 564484de-7ab3-4be3-9fd3-4145970cbc7e response_code = 405 uri = /v1/ip-pools/default?project=demo-project
132572025-03-07T23:12:30.267ZINFOtest_unauthorized (external client test context): client received response status = 405
132582025-03-07T23:12:30.267ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/ip-pools/default?project=demo-project
132592025-03-07T23:12:30.268ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/ip-pools/default?project=demo-project
132602025-03-07T23:12:30.268ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 uri = /v1/ip-pools/default?project=demo-project
132612025-03-07T23:12:30.268ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 uri = /v1/ip-pools/default?project=demo-project
132622025-03-07T23:12:30.268ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools/default?project=demo-project
132632025-03-07T23:12:30.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132642025-03-07T23:12:30.268ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132652025-03-07T23:12:30.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132662025-03-07T23:12:30.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132672025-03-07T23:12:30.272ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132682025-03-07T23:12:30.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132692025-03-07T23:12:30.307ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
132702025-03-07T23:12:30.308ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
132712025-03-07T23:12:30.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132722025-03-07T23:12:30.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132732025-03-07T23:12:30.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132742025-03-07T23:12:30.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
132752025-03-07T23:12:30.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132762025-03-07T23:12:30.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132772025-03-07T23:12:30.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132782025-03-07T23:12:30.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
132792025-03-07T23:12:30.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
132802025-03-07T23:12:30.321ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132812025-03-07T23:12:30.321ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132822025-03-07T23:12:30.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132832025-03-07T23:12:30.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
132842025-03-07T23:12:30.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
132852025-03-07T23:12:30.324ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
132862025-03-07T23:12:30.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132872025-03-07T23:12:30.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132882025-03-07T23:12:30.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132892025-03-07T23:12:30.327ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
132902025-03-07T23:12:30.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132912025-03-07T23:12:30.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132922025-03-07T23:12:30.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132932025-03-07T23:12:30.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
132942025-03-07T23:12:30.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
132952025-03-07T23:12:30.333ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 uri = /v1/ip-pools/default?project=demo-project
132962025-03-07T23:12:30.333ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database uri = /v1/ip-pools/default?project=demo-project
132972025-03-07T23:12:30.333ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
132982025-03-07T23:12:30.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
132992025-03-07T23:12:30.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/ip-pools/default?project=demo-project
133002025-03-07T23:12:30.336ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools/default?project=demo-project
133012025-03-07T23:12:30.337ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database uri = /v1/ip-pools/default?project=demo-project
133022025-03-07T23:12:30.337ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
133032025-03-07T23:12:30.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
133042025-03-07T23:12:30.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools/default?project=demo-project
133052025-03-07T23:12:30.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
133062025-03-07T23:12:30.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database uri = /v1/ip-pools/default?project=demo-project
133072025-03-07T23:12:30.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
133082025-03-07T23:12:30.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
133092025-03-07T23:12:30.371ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 103484 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c1c1c92-48c1-46bf-83dd-48f56521fa62 response_code = 200 uri = /v1/ip-pools/default?project=demo-project
133102025-03-07T23:12:30.372ZINFOtest_unauthorized (external client test context): client received response status = 200
133112025-03-07T23:12:30.374ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/silos
133122025-03-07T23:12:30.374ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/silos
133132025-03-07T23:12:30.374ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
133142025-03-07T23:12:30.374ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 uri = /v1/system/ip-pools/default/silos
133152025-03-07T23:12:30.374ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 uri = /v1/system/ip-pools/default/silos
133162025-03-07T23:12:30.375ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
133172025-03-07T23:12:30.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133182025-03-07T23:12:30.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133192025-03-07T23:12:30.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133202025-03-07T23:12:30.378ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133212025-03-07T23:12:30.378ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133222025-03-07T23:12:30.378ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133232025-03-07T23:12:30.380ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
133242025-03-07T23:12:30.380ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
133252025-03-07T23:12:30.380ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133262025-03-07T23:12:30.381ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133272025-03-07T23:12:30.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133282025-03-07T23:12:30.388ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
133292025-03-07T23:12:30.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133302025-03-07T23:12:30.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133312025-03-07T23:12:30.389ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133322025-03-07T23:12:30.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
133332025-03-07T23:12:30.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
133342025-03-07T23:12:30.408ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133352025-03-07T23:12:30.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133362025-03-07T23:12:30.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133372025-03-07T23:12:30.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
133382025-03-07T23:12:30.411ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
133392025-03-07T23:12:30.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133402025-03-07T23:12:30.411ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133412025-03-07T23:12:30.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133422025-03-07T23:12:30.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
133432025-03-07T23:12:30.415ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133442025-03-07T23:12:30.415ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133452025-03-07T23:12:30.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133462025-03-07T23:12:30.418ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
133472025-03-07T23:12:30.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
133482025-03-07T23:12:30.421ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 uri = /v1/system/ip-pools/default/silos
133492025-03-07T23:12:30.421ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database uri = /v1/system/ip-pools/default/silos
133502025-03-07T23:12:30.421ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
133512025-03-07T23:12:30.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
133522025-03-07T23:12:30.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
133532025-03-07T23:12:30.431ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
133542025-03-07T23:12:30.431ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database uri = /v1/system/ip-pools/default/silos
133552025-03-07T23:12:30.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
133562025-03-07T23:12:30.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
133572025-03-07T23:12:30.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
133582025-03-07T23:12:30.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
133592025-03-07T23:12:30.452ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Fleet uri = /v1/system/ip-pools/default/silos
133602025-03-07T23:12:30.453ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
133612025-03-07T23:12:30.453ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database uri = /v1/system/ip-pools/default/silos
133622025-03-07T23:12:30.453ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
133632025-03-07T23:12:30.454ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
133642025-03-07T23:12:30.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
133652025-03-07T23:12:30.470ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Fleet result = Ok(()) uri = /v1/system/ip-pools/default/silos
133662025-03-07T23:12:30.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database uri = /v1/system/ip-pools/default/silos
133672025-03-07T23:12:30.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
133682025-03-07T23:12:30.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
133692025-03-07T23:12:30.482ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 107159 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8b1a9f4e-0f2f-41cc-8711-244dd10d5b41 response_code = 200 uri = /v1/system/ip-pools/default/silos
133702025-03-07T23:12:30.485ZINFOtest_unauthorized (external client test context): client received response status = 200
133712025-03-07T23:12:30.485ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/silos
133722025-03-07T23:12:30.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
133732025-03-07T23:12:30.486ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 uri = /v1/system/ip-pools/default/silos
133742025-03-07T23:12:30.487ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 uri = /v1/system/ip-pools/default/silos
133752025-03-07T23:12:30.487ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos
133762025-03-07T23:12:30.487ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133772025-03-07T23:12:30.487ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133782025-03-07T23:12:30.489ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133792025-03-07T23:12:30.493ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133802025-03-07T23:12:30.493ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133812025-03-07T23:12:30.494ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133822025-03-07T23:12:30.506ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
133832025-03-07T23:12:30.507ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
133842025-03-07T23:12:30.507ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133852025-03-07T23:12:30.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133862025-03-07T23:12:30.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133872025-03-07T23:12:30.516ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
133882025-03-07T23:12:30.516ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133892025-03-07T23:12:30.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133902025-03-07T23:12:30.518ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133912025-03-07T23:12:30.523ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
133922025-03-07T23:12:30.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
133932025-03-07T23:12:30.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133942025-03-07T23:12:30.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133952025-03-07T23:12:30.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
133962025-03-07T23:12:30.541ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
133972025-03-07T23:12:30.541ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
133982025-03-07T23:12:30.541ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133992025-03-07T23:12:30.541ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134002025-03-07T23:12:30.542ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134012025-03-07T23:12:30.544ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134022025-03-07T23:12:30.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134032025-03-07T23:12:30.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134042025-03-07T23:12:30.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134052025-03-07T23:12:30.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134062025-03-07T23:12:30.552ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
134072025-03-07T23:12:30.554ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 uri = /v1/system/ip-pools/default/silos
134082025-03-07T23:12:30.554ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = Database uri = /v1/system/ip-pools/default/silos
134092025-03-07T23:12:30.554ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134102025-03-07T23:12:30.554ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
134112025-03-07T23:12:30.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
134122025-03-07T23:12:30.562ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
134132025-03-07T23:12:30.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = Database uri = /v1/system/ip-pools/default/silos
134142025-03-07T23:12:30.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134152025-03-07T23:12:30.565ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
134162025-03-07T23:12:30.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134172025-03-07T23:12:30.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos
134182025-03-07T23:12:30.643ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 156963 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fa926a45-75d4-40f1-aedf-97cfaaf3cb97 response_code = 404 uri = /v1/system/ip-pools/default/silos
134192025-03-07T23:12:30.643ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134202025-03-07T23:12:30.644ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134212025-03-07T23:12:30.644ZINFOtest_unauthorized (external client test context): client received response status = 404
134222025-03-07T23:12:30.647ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/silos
134232025-03-07T23:12:30.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134242025-03-07T23:12:30.649ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 uri = /v1/system/ip-pools/default/silos
134252025-03-07T23:12:30.654ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 uri = /v1/system/ip-pools/default/silos
134262025-03-07T23:12:30.654ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 uri = /v1/system/ip-pools/default/silos
134272025-03-07T23:12:30.654ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 uri = /v1/system/ip-pools/default/silos
134282025-03-07T23:12:30.654ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 resource = Database uri = /v1/system/ip-pools/default/silos
134292025-03-07T23:12:30.654ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134302025-03-07T23:12:30.655ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos
134312025-03-07T23:12:30.656ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134322025-03-07T23:12:30.657ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134332025-03-07T23:12:30.657ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134342025-03-07T23:12:30.657ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
134352025-03-07T23:12:30.658ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 8477 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c7395bc-290d-49d4-bc31-835d0cf44f15 response_code = 401 uri = /v1/system/ip-pools/default/silos
134362025-03-07T23:12:30.658ZINFOtest_unauthorized (external client test context): client received response status = 401
134372025-03-07T23:12:30.658ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/silos
134382025-03-07T23:12:30.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134392025-03-07T23:12:30.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = db513f67-b0a5-4ba8-93cd-146e6314fb75 uri = /v1/system/ip-pools/default/silos
134402025-03-07T23:12:30.658ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = db513f67-b0a5-4ba8-93cd-146e6314fb75 uri = /v1/system/ip-pools/default/silos
134412025-03-07T23:12:30.662ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = db513f67-b0a5-4ba8-93cd-146e6314fb75 uri = /v1/system/ip-pools/default/silos
134422025-03-07T23:12:30.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 2880 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = db513f67-b0a5-4ba8-93cd-146e6314fb75 response_code = 401 uri = /v1/system/ip-pools/default/silos
134432025-03-07T23:12:30.662ZINFOtest_unauthorized (external client test context): client received response status = 401
134442025-03-07T23:12:30.662ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/silos
134452025-03-07T23:12:30.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134462025-03-07T23:12:30.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60ddb60c-b4a8-4d7e-b4ab-d75ff4344d02 uri = /v1/system/ip-pools/default/silos
134472025-03-07T23:12:30.668ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60ddb60c-b4a8-4d7e-b4ab-d75ff4344d02 uri = /v1/system/ip-pools/default/silos
134482025-03-07T23:12:30.668ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1236:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1262:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60ddb60c-b4a8-4d7e-b4ab-d75ff4344d02 uri = /v1/system/ip-pools/default/silos
134492025-03-07T23:12:30.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1861 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60ddb60c-b4a8-4d7e-b4ab-d75ff4344d02 response_code = 401 uri = /v1/system/ip-pools/default/silos
134502025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client received response status = 401
134512025-03-07T23:12:30.670ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/silos
134522025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134532025-03-07T23:12:30.670ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52815fc8-84f1-40bb-bc83-111e4287a687 uri = /v1/system/ip-pools/default/silos
134542025-03-07T23:12:30.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52815fc8-84f1-40bb-bc83-111e4287a687 response_code = 405 uri = /v1/system/ip-pools/default/silos
134552025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client received response status = 405
134562025-03-07T23:12:30.670ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/silos
134572025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134582025-03-07T23:12:30.670ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9e429ab9-af05-4d22-9f76-d93f3f8f944e uri = /v1/system/ip-pools/default/silos
134592025-03-07T23:12:30.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9e429ab9-af05-4d22-9f76-d93f3f8f944e response_code = 405 uri = /v1/system/ip-pools/default/silos
134602025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client received response status = 405
134612025-03-07T23:12:30.670ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/silos
134622025-03-07T23:12:30.670ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134632025-03-07T23:12:30.670ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f5c6ec79-fff0-4980-a174-36be2b6a78a8 uri = /v1/system/ip-pools/default/silos
134642025-03-07T23:12:30.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f5c6ec79-fff0-4980-a174-36be2b6a78a8 response_code = 405 uri = /v1/system/ip-pools/default/silos
134652025-03-07T23:12:30.672ZINFOtest_unauthorized (external client test context): client received response status = 405
134662025-03-07T23:12:30.672ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/silos
134672025-03-07T23:12:30.672ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134682025-03-07T23:12:30.672ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 73192b2d-7b5c-41ac-8fc7-302258c8fea3 uri = /v1/system/ip-pools/default/silos
134692025-03-07T23:12:30.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 73192b2d-7b5c-41ac-8fc7-302258c8fea3 response_code = 405 uri = /v1/system/ip-pools/default/silos
134702025-03-07T23:12:30.672ZINFOtest_unauthorized (external client test context): client received response status = 405
134712025-03-07T23:12:30.672ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/silos
134722025-03-07T23:12:30.672ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
134732025-03-07T23:12:30.672ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb uri = /v1/system/ip-pools/default/silos
134742025-03-07T23:12:30.672ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb uri = /v1/system/ip-pools/default/silos
134752025-03-07T23:12:30.672ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos
134762025-03-07T23:12:30.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134772025-03-07T23:12:30.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134782025-03-07T23:12:30.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134792025-03-07T23:12:30.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134802025-03-07T23:12:30.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134812025-03-07T23:12:30.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134822025-03-07T23:12:30.683ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
134832025-03-07T23:12:30.683ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134842025-03-07T23:12:30.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134852025-03-07T23:12:30.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134862025-03-07T23:12:30.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134872025-03-07T23:12:30.688ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134882025-03-07T23:12:30.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134892025-03-07T23:12:30.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134902025-03-07T23:12:30.689ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134912025-03-07T23:12:30.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134922025-03-07T23:12:30.707ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
134932025-03-07T23:12:30.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134942025-03-07T23:12:30.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134952025-03-07T23:12:30.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134962025-03-07T23:12:30.712ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
134972025-03-07T23:12:30.712ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134982025-03-07T23:12:30.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134992025-03-07T23:12:30.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135002025-03-07T23:12:30.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135012025-03-07T23:12:30.717ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
135022025-03-07T23:12:30.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135032025-03-07T23:12:30.718ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135042025-03-07T23:12:30.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135052025-03-07T23:12:30.733ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
135062025-03-07T23:12:30.734ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
135072025-03-07T23:12:30.734ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb uri = /v1/system/ip-pools/default/silos
135082025-03-07T23:12:30.734ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = Database uri = /v1/system/ip-pools/default/silos
135092025-03-07T23:12:30.734ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135102025-03-07T23:12:30.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
135112025-03-07T23:12:30.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
135122025-03-07T23:12:30.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
135132025-03-07T23:12:30.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = Database uri = /v1/system/ip-pools/default/silos
135142025-03-07T23:12:30.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135152025-03-07T23:12:30.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
135162025-03-07T23:12:30.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135172025-03-07T23:12:30.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos
135182025-03-07T23:12:30.764ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 95939 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3d5a9b36-e63d-42ec-bedb-95a39b0e1acb response_code = 404 uri = /v1/system/ip-pools/default/silos
135192025-03-07T23:12:30.765ZINFOtest_unauthorized (external client test context): client received response status = 404
135202025-03-07T23:12:30.766ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/silos
135212025-03-07T23:12:30.766ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135222025-03-07T23:12:30.767ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 uri = /v1/system/ip-pools/default/silos
135232025-03-07T23:12:30.767ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 uri = /v1/system/ip-pools/default/silos
135242025-03-07T23:12:30.768ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 uri = /v1/system/ip-pools/default/silos
135252025-03-07T23:12:30.768ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 uri = /v1/system/ip-pools/default/silos
135262025-03-07T23:12:30.768ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 resource = Database uri = /v1/system/ip-pools/default/silos
135272025-03-07T23:12:30.768ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135282025-03-07T23:12:30.768ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos
135292025-03-07T23:12:30.785ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 18139 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 48401132-5451-443f-b589-25745d0ea514 response_code = 401 uri = /v1/system/ip-pools/default/silos
135302025-03-07T23:12:30.786ZINFOtest_unauthorized (external client test context): client received response status = 401
135312025-03-07T23:12:30.787ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/silos
135322025-03-07T23:12:30.787ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135332025-03-07T23:12:30.790ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2b9cb63a-c8d1-40f4-8554-1e2e39e5d7f1 uri = /v1/system/ip-pools/default/silos
135342025-03-07T23:12:30.790ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2b9cb63a-c8d1-40f4-8554-1e2e39e5d7f1 uri = /v1/system/ip-pools/default/silos
135352025-03-07T23:12:30.792ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2b9cb63a-c8d1-40f4-8554-1e2e39e5d7f1 uri = /v1/system/ip-pools/default/silos
135362025-03-07T23:12:30.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 932 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2b9cb63a-c8d1-40f4-8554-1e2e39e5d7f1 response_code = 401 uri = /v1/system/ip-pools/default/silos
135372025-03-07T23:12:30.804ZINFOtest_unauthorized (external client test context): client received response status = 401
135382025-03-07T23:12:30.812ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/silos
135392025-03-07T23:12:30.812ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135402025-03-07T23:12:30.814ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 69b5dcfa-91d5-4fe7-a8b2-6a269c92b395 uri = /v1/system/ip-pools/default/silos
135412025-03-07T23:12:30.816ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 69b5dcfa-91d5-4fe7-a8b2-6a269c92b395 uri = /v1/system/ip-pools/default/silos
135422025-03-07T23:12:30.819ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1273:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1287:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 69b5dcfa-91d5-4fe7-a8b2-6a269c92b395 uri = /v1/system/ip-pools/default/silos
135432025-03-07T23:12:30.819ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3413 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 69b5dcfa-91d5-4fe7-a8b2-6a269c92b395 response_code = 401 uri = /v1/system/ip-pools/default/silos
135442025-03-07T23:12:30.819ZINFOtest_unauthorized (external client test context): client received response status = 401
135452025-03-07T23:12:30.819ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/silos
135462025-03-07T23:12:30.819ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135472025-03-07T23:12:30.826ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d0e86b4-9512-4db5-91a8-fe3accae94ff uri = /v1/system/ip-pools/default/silos
135482025-03-07T23:12:30.826ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 269 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d0e86b4-9512-4db5-91a8-fe3accae94ff response_code = 405 uri = /v1/system/ip-pools/default/silos
135492025-03-07T23:12:30.829ZINFOtest_unauthorized (external client test context): client received response status = 405
135502025-03-07T23:12:30.829ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/silos
135512025-03-07T23:12:30.830ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135522025-03-07T23:12:30.830ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0eb1d37b-204a-489b-bf57-ade71962273d uri = /v1/system/ip-pools/default/silos
135532025-03-07T23:12:30.830ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0eb1d37b-204a-489b-bf57-ade71962273d response_code = 405 uri = /v1/system/ip-pools/default/silos
135542025-03-07T23:12:30.832ZINFOtest_unauthorized (external client test context): client received response status = 405
135552025-03-07T23:12:30.832ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/silos
135562025-03-07T23:12:30.832ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135572025-03-07T23:12:30.838ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dbe573e9-bf64-472a-a939-c960159945db uri = /v1/system/ip-pools/default/silos
135582025-03-07T23:12:30.838ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 240 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dbe573e9-bf64-472a-a939-c960159945db response_code = 405 uri = /v1/system/ip-pools/default/silos
135592025-03-07T23:12:30.844ZINFOtest_unauthorized (external client test context): client received response status = 405
135602025-03-07T23:12:30.844ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/silos
135612025-03-07T23:12:30.844ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135622025-03-07T23:12:30.845ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ec2362d8-db34-4e9d-bb1a-bc826561b701 uri = /v1/system/ip-pools/default/silos
135632025-03-07T23:12:30.846ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 188 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ec2362d8-db34-4e9d-bb1a-bc826561b701 response_code = 405 uri = /v1/system/ip-pools/default/silos
135642025-03-07T23:12:30.846ZINFOtest_unauthorized (external client test context): client received response status = 405
135652025-03-07T23:12:30.846ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/silos
135662025-03-07T23:12:30.846ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135672025-03-07T23:12:30.846ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e2f9196e-263d-4612-bda2-236c40cc6952 uri = /v1/system/ip-pools/default/silos
135682025-03-07T23:12:30.846ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 191 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e2f9196e-263d-4612-bda2-236c40cc6952 response_code = 405 uri = /v1/system/ip-pools/default/silos
135692025-03-07T23:12:30.847ZINFOtest_unauthorized (external client test context): client received response status = 405
135702025-03-07T23:12:30.847ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/silos
135712025-03-07T23:12:30.847ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135722025-03-07T23:12:30.847ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3c73d4cc-4f53-4465-b62a-569d546c45a8 uri = /v1/system/ip-pools/default/silos
135732025-03-07T23:12:30.847ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 182 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3c73d4cc-4f53-4465-b62a-569d546c45a8 response_code = 405 uri = /v1/system/ip-pools/default/silos
135742025-03-07T23:12:30.848ZINFOtest_unauthorized (external client test context): client received response status = 405
135752025-03-07T23:12:30.848ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/silos
135762025-03-07T23:12:30.848ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135772025-03-07T23:12:30.848ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cca76a00-d13a-4903-8f11-db198fa65b00 uri = /v1/system/ip-pools/default/silos
135782025-03-07T23:12:30.848ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 178 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cca76a00-d13a-4903-8f11-db198fa65b00 response_code = 405 uri = /v1/system/ip-pools/default/silos
135792025-03-07T23:12:30.850ZINFOtest_unauthorized (external client test context): client received response status = 405
135802025-03-07T23:12:30.850ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/silos
135812025-03-07T23:12:30.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135822025-03-07T23:12:30.850ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 95ae1a5e-7e4a-4b5c-a314-575746cd8e65 uri = /v1/system/ip-pools/default/silos
135832025-03-07T23:12:30.850ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 95ae1a5e-7e4a-4b5c-a314-575746cd8e65 response_code = 405 uri = /v1/system/ip-pools/default/silos
135842025-03-07T23:12:30.850ZINFOtest_unauthorized (external client test context): client received response status = 405
135852025-03-07T23:12:30.850ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/silos
135862025-03-07T23:12:30.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos
135872025-03-07T23:12:30.850ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 uri = /v1/system/ip-pools/default/silos
135882025-03-07T23:12:30.851ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 uri = /v1/system/ip-pools/default/silos
135892025-03-07T23:12:30.851ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
135902025-03-07T23:12:30.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135912025-03-07T23:12:30.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135922025-03-07T23:12:30.852ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135932025-03-07T23:12:30.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135942025-03-07T23:12:30.862ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135952025-03-07T23:12:30.865ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135962025-03-07T23:12:30.873ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
135972025-03-07T23:12:30.873ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
135982025-03-07T23:12:30.873ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135992025-03-07T23:12:30.873ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136002025-03-07T23:12:30.875ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136012025-03-07T23:12:30.895ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136022025-03-07T23:12:30.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136032025-03-07T23:12:30.895ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136042025-03-07T23:12:30.896ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136052025-03-07T23:12:30.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
136062025-03-07T23:12:30.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
136072025-03-07T23:12:30.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136082025-03-07T23:12:30.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136092025-03-07T23:12:30.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136102025-03-07T23:12:30.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
136112025-03-07T23:12:30.929ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
136122025-03-07T23:12:30.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136132025-03-07T23:12:30.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136142025-03-07T23:12:30.930ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136152025-03-07T23:12:30.939ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136162025-03-07T23:12:30.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136172025-03-07T23:12:30.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136182025-03-07T23:12:30.941ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136192025-03-07T23:12:30.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
136202025-03-07T23:12:30.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
136212025-03-07T23:12:30.955ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 uri = /v1/system/ip-pools/default/silos
136222025-03-07T23:12:30.955ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database uri = /v1/system/ip-pools/default/silos
136232025-03-07T23:12:30.955ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136242025-03-07T23:12:30.956ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136252025-03-07T23:12:30.963ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
136262025-03-07T23:12:30.963ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
136272025-03-07T23:12:30.963ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database uri = /v1/system/ip-pools/default/silos
136282025-03-07T23:12:30.963ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136292025-03-07T23:12:30.964ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136302025-03-07T23:12:30.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
136312025-03-07T23:12:30.974ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
136322025-03-07T23:12:30.975ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Fleet uri = /v1/system/ip-pools/default/silos
136332025-03-07T23:12:30.980ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
136342025-03-07T23:12:30.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database uri = /v1/system/ip-pools/default/silos
136352025-03-07T23:12:30.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136362025-03-07T23:12:30.980ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136372025-03-07T23:12:30.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
136382025-03-07T23:12:30.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Fleet result = Ok(()) uri = /v1/system/ip-pools/default/silos
136392025-03-07T23:12:30.987ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database uri = /v1/system/ip-pools/default/silos
136402025-03-07T23:12:30.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136412025-03-07T23:12:30.989ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136422025-03-07T23:12:31.007ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 156361 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f061d1e-f587-4a73-8e93-abde393e79e0 response_code = 200 uri = /v1/system/ip-pools/default/silos
136432025-03-07T23:12:31.013ZINFOtest_unauthorized (external client test context): client received response status = 200
136442025-03-07T23:12:31.016ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/silos/demo-silo
136452025-03-07T23:12:31.016ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/silos/demo-silo
136462025-03-07T23:12:31.016ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/silos/demo-silo
136472025-03-07T23:12:31.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
136482025-03-07T23:12:31.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9593225b-3f55-4a74-9305-9dd90965cacf uri = /v1/system/ip-pools/default/silos/demo-silo
136492025-03-07T23:12:31.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 102 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9593225b-3f55-4a74-9305-9dd90965cacf response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
136502025-03-07T23:12:31.016ZINFOtest_unauthorized (external client test context): client received response status = 405
136512025-03-07T23:12:31.016ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/silos/demo-silo
136522025-03-07T23:12:31.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
136532025-03-07T23:12:31.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ae38e3e-6719-4e58-91f0-d2d5de379718 uri = /v1/system/ip-pools/default/silos/demo-silo
136542025-03-07T23:12:31.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4ae38e3e-6719-4e58-91f0-d2d5de379718 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
136552025-03-07T23:12:31.016ZINFOtest_unauthorized (external client test context): client received response status = 405
136562025-03-07T23:12:31.016ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/silos/demo-silo
136572025-03-07T23:12:31.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
136582025-03-07T23:12:31.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54fd2750-8667-4d9c-90f9-2240a3654035 uri = /v1/system/ip-pools/default/silos/demo-silo
136592025-03-07T23:12:31.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54fd2750-8667-4d9c-90f9-2240a3654035 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
136602025-03-07T23:12:31.017ZINFOtest_unauthorized (external client test context): client received response status = 405
136612025-03-07T23:12:31.017ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/silos/demo-silo
136622025-03-07T23:12:31.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
136632025-03-07T23:12:31.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eabacf22-539c-49bc-8840-855c93d02743 uri = /v1/system/ip-pools/default/silos/demo-silo
136642025-03-07T23:12:31.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eabacf22-539c-49bc-8840-855c93d02743 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
136652025-03-07T23:12:31.017ZINFOtest_unauthorized (external client test context): client received response status = 405
136662025-03-07T23:12:31.017ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
136672025-03-07T23:12:31.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
136682025-03-07T23:12:31.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 uri = /v1/system/ip-pools/default/silos/demo-silo
136692025-03-07T23:12:31.017ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 uri = /v1/system/ip-pools/default/silos/demo-silo
136702025-03-07T23:12:31.017ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos/demo-silo
136712025-03-07T23:12:31.017ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136722025-03-07T23:12:31.017ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136732025-03-07T23:12:31.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136742025-03-07T23:12:31.017ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136752025-03-07T23:12:31.018ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136762025-03-07T23:12:31.018ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136772025-03-07T23:12:31.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
136782025-03-07T23:12:31.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
136792025-03-07T23:12:31.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136802025-03-07T23:12:31.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136812025-03-07T23:12:31.030ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136822025-03-07T23:12:31.033ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136832025-03-07T23:12:31.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136842025-03-07T23:12:31.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136852025-03-07T23:12:31.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136862025-03-07T23:12:31.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
136872025-03-07T23:12:31.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
136882025-03-07T23:12:31.042ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136892025-03-07T23:12:31.042ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136902025-03-07T23:12:31.042ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136912025-03-07T23:12:31.043ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
136922025-03-07T23:12:31.044ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
136932025-03-07T23:12:31.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136942025-03-07T23:12:31.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136952025-03-07T23:12:31.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136962025-03-07T23:12:31.046ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136972025-03-07T23:12:31.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136982025-03-07T23:12:31.046ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136992025-03-07T23:12:31.047ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137002025-03-07T23:12:31.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
137012025-03-07T23:12:31.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
137022025-03-07T23:12:31.063ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 uri = /v1/system/ip-pools/default/silos/demo-silo
137032025-03-07T23:12:31.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
137042025-03-07T23:12:31.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
137052025-03-07T23:12:31.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
137062025-03-07T23:12:31.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos/demo-silo
137072025-03-07T23:12:31.063ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos/demo-silo
137082025-03-07T23:12:31.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
137092025-03-07T23:12:31.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
137102025-03-07T23:12:31.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
137112025-03-07T23:12:31.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
137122025-03-07T23:12:31.089ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos/demo-silo
137132025-03-07T23:12:31.090ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 77808 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dbcf8143-03e9-4c74-a995-77ba726d7445 response_code = 404 uri = /v1/system/ip-pools/default/silos/demo-silo
137142025-03-07T23:12:31.090ZINFOtest_unauthorized (external client test context): client received response status = 404
137152025-03-07T23:12:31.090ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
137162025-03-07T23:12:31.097ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137172025-03-07T23:12:31.097ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d uri = /v1/system/ip-pools/default/silos/demo-silo
137182025-03-07T23:12:31.097ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d uri = /v1/system/ip-pools/default/silos/demo-silo
137192025-03-07T23:12:31.097ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d uri = /v1/system/ip-pools/default/silos/demo-silo
137202025-03-07T23:12:31.097ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d uri = /v1/system/ip-pools/default/silos/demo-silo
137212025-03-07T23:12:31.097ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
137222025-03-07T23:12:31.097ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
137232025-03-07T23:12:31.097ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos/demo-silo
137242025-03-07T23:12:31.098ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 895 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8b18ef4-34da-4aeb-a1d1-3189c7b77b8d response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
137252025-03-07T23:12:31.098ZINFOtest_unauthorized (external client test context): client received response status = 401
137262025-03-07T23:12:31.098ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
137272025-03-07T23:12:31.098ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137282025-03-07T23:12:31.098ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9a3f114-ad18-4fed-8c94-19ba27ebb499 uri = /v1/system/ip-pools/default/silos/demo-silo
137292025-03-07T23:12:31.098ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9a3f114-ad18-4fed-8c94-19ba27ebb499 uri = /v1/system/ip-pools/default/silos/demo-silo
137302025-03-07T23:12:31.098ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9a3f114-ad18-4fed-8c94-19ba27ebb499 uri = /v1/system/ip-pools/default/silos/demo-silo
137312025-03-07T23:12:31.098ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 247 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9a3f114-ad18-4fed-8c94-19ba27ebb499 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
137322025-03-07T23:12:31.098ZINFOtest_unauthorized (external client test context): client received response status = 401
137332025-03-07T23:12:31.098ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
137342025-03-07T23:12:31.098ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137352025-03-07T23:12:31.098ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 735bdc02-a64b-4d43-bfb2-fe9346dba9f7 uri = /v1/system/ip-pools/default/silos/demo-silo
137362025-03-07T23:12:31.098ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 735bdc02-a64b-4d43-bfb2-fe9346dba9f7 uri = /v1/system/ip-pools/default/silos/demo-silo
137372025-03-07T23:12:31.099ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1322:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1342:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 735bdc02-a64b-4d43-bfb2-fe9346dba9f7 uri = /v1/system/ip-pools/default/silos/demo-silo
137382025-03-07T23:12:31.099ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 934 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 735bdc02-a64b-4d43-bfb2-fe9346dba9f7 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
137392025-03-07T23:12:31.099ZINFOtest_unauthorized (external client test context): client received response status = 401
137402025-03-07T23:12:31.099ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/silos/demo-silo
137412025-03-07T23:12:31.099ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137422025-03-07T23:12:31.099ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49d475df-a586-4fbb-be05-18d73ebf4a15 uri = /v1/system/ip-pools/default/silos/demo-silo
137432025-03-07T23:12:31.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49d475df-a586-4fbb-be05-18d73ebf4a15 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
137442025-03-07T23:12:31.101ZINFOtest_unauthorized (external client test context): client received response status = 405
137452025-03-07T23:12:31.103ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/silos/demo-silo
137462025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137472025-03-07T23:12:31.103ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dff08610-ad6f-448c-b463-e836f9c63340 uri = /v1/system/ip-pools/default/silos/demo-silo
137482025-03-07T23:12:31.103ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dff08610-ad6f-448c-b463-e836f9c63340 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
137492025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client received response status = 405
137502025-03-07T23:12:31.103ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/silos/demo-silo
137512025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137522025-03-07T23:12:31.103ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c8b9953-6a6f-494c-8b35-f467c9eff5f7 uri = /v1/system/ip-pools/default/silos/demo-silo
137532025-03-07T23:12:31.103ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c8b9953-6a6f-494c-8b35-f467c9eff5f7 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
137542025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client received response status = 405
137552025-03-07T23:12:31.103ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/silos/demo-silo
137562025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137572025-03-07T23:12:31.103ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 662969e3-8223-4f6c-9475-e88f83b283c7 uri = /v1/system/ip-pools/default/silos/demo-silo
137582025-03-07T23:12:31.103ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 662969e3-8223-4f6c-9475-e88f83b283c7 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
137592025-03-07T23:12:31.103ZINFOtest_unauthorized (external client test context): client received response status = 405
137602025-03-07T23:12:31.103ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
137612025-03-07T23:12:31.104ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
137622025-03-07T23:12:31.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 uri = /v1/system/ip-pools/default/silos/demo-silo
137632025-03-07T23:12:31.104ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 uri = /v1/system/ip-pools/default/silos/demo-silo
137642025-03-07T23:12:31.104ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos/demo-silo
137652025-03-07T23:12:31.104ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137662025-03-07T23:12:31.104ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137672025-03-07T23:12:31.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137682025-03-07T23:12:31.109ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137692025-03-07T23:12:31.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137702025-03-07T23:12:31.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137712025-03-07T23:12:31.112ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
137722025-03-07T23:12:31.120ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
137732025-03-07T23:12:31.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137742025-03-07T23:12:31.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137752025-03-07T23:12:31.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137762025-03-07T23:12:31.120ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
137772025-03-07T23:12:31.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137782025-03-07T23:12:31.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137792025-03-07T23:12:31.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137802025-03-07T23:12:31.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
137812025-03-07T23:12:31.122ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
137822025-03-07T23:12:31.122ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137832025-03-07T23:12:31.122ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137842025-03-07T23:12:31.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137852025-03-07T23:12:31.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
137862025-03-07T23:12:31.126ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
137872025-03-07T23:12:31.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137882025-03-07T23:12:31.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137892025-03-07T23:12:31.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137902025-03-07T23:12:31.131ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
137912025-03-07T23:12:31.131ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137922025-03-07T23:12:31.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137932025-03-07T23:12:31.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137942025-03-07T23:12:31.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
137952025-03-07T23:12:31.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
137962025-03-07T23:12:31.137ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 uri = /v1/system/ip-pools/default/silos/demo-silo
137972025-03-07T23:12:31.137ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
137982025-03-07T23:12:31.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
137992025-03-07T23:12:31.137ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
138002025-03-07T23:12:31.139ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos/demo-silo
138012025-03-07T23:12:31.141ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos/demo-silo
138022025-03-07T23:12:31.141ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
138032025-03-07T23:12:31.141ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138042025-03-07T23:12:31.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
138052025-03-07T23:12:31.143ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138062025-03-07T23:12:31.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos/demo-silo
138072025-03-07T23:12:31.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 54392 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d823d613-06ad-451c-921e-f2ac346e7926 response_code = 404 uri = /v1/system/ip-pools/default/silos/demo-silo
138082025-03-07T23:12:31.155ZINFOtest_unauthorized (external client test context): client received response status = 404
138092025-03-07T23:12:31.155ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
138102025-03-07T23:12:31.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138112025-03-07T23:12:31.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 uri = /v1/system/ip-pools/default/silos/demo-silo
138122025-03-07T23:12:31.155ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 uri = /v1/system/ip-pools/default/silos/demo-silo
138132025-03-07T23:12:31.155ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 uri = /v1/system/ip-pools/default/silos/demo-silo
138142025-03-07T23:12:31.155ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 uri = /v1/system/ip-pools/default/silos/demo-silo
138152025-03-07T23:12:31.155ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
138162025-03-07T23:12:31.157ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138172025-03-07T23:12:31.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos/demo-silo
138182025-03-07T23:12:31.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 867 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 97669a9e-50cf-42cd-8baf-2e4705917944 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
138192025-03-07T23:12:31.158ZINFOtest_unauthorized (external client test context): client received response status = 401
138202025-03-07T23:12:31.159ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
138212025-03-07T23:12:31.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138222025-03-07T23:12:31.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e2b30b6-4c87-4e38-a069-3b85ae176984 uri = /v1/system/ip-pools/default/silos/demo-silo
138232025-03-07T23:12:31.159ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e2b30b6-4c87-4e38-a069-3b85ae176984 uri = /v1/system/ip-pools/default/silos/demo-silo
138242025-03-07T23:12:31.159ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e2b30b6-4c87-4e38-a069-3b85ae176984 uri = /v1/system/ip-pools/default/silos/demo-silo
138252025-03-07T23:12:31.159ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 197 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e2b30b6-4c87-4e38-a069-3b85ae176984 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
138262025-03-07T23:12:31.159ZINFOtest_unauthorized (external client test context): client received response status = 401
138272025-03-07T23:12:31.159ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
138282025-03-07T23:12:31.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138292025-03-07T23:12:31.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a82289d-9a07-4a4a-bfe4-6e721342457a uri = /v1/system/ip-pools/default/silos/demo-silo
138302025-03-07T23:12:31.159ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a82289d-9a07-4a4a-bfe4-6e721342457a uri = /v1/system/ip-pools/default/silos/demo-silo
138312025-03-07T23:12:31.162ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1297:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1311:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a82289d-9a07-4a4a-bfe4-6e721342457a uri = /v1/system/ip-pools/default/silos/demo-silo
138322025-03-07T23:12:31.162ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 895 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a82289d-9a07-4a4a-bfe4-6e721342457a response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
138332025-03-07T23:12:31.162ZINFOtest_unauthorized (external client test context): client received response status = 401
138342025-03-07T23:12:31.165ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
138352025-03-07T23:12:31.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138362025-03-07T23:12:31.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1892420d-6111-4ccf-9530-537277a06ae9 uri = /v1/system/ip-pools/default/silos/demo-silo
138372025-03-07T23:12:31.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1892420d-6111-4ccf-9530-537277a06ae9 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138382025-03-07T23:12:31.166ZINFOtest_unauthorized (external client test context): client received response status = 405
138392025-03-07T23:12:31.166ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
138402025-03-07T23:12:31.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138412025-03-07T23:12:31.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 82800ff9-d8c0-423c-9c3e-d85ac78e7445 uri = /v1/system/ip-pools/default/silos/demo-silo
138422025-03-07T23:12:31.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 82800ff9-d8c0-423c-9c3e-d85ac78e7445 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138432025-03-07T23:12:31.167ZINFOtest_unauthorized (external client test context): client received response status = 405
138442025-03-07T23:12:31.167ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
138452025-03-07T23:12:31.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138462025-03-07T23:12:31.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92e9cc26-eb15-4933-b512-66c45f9cf57d uri = /v1/system/ip-pools/default/silos/demo-silo
138472025-03-07T23:12:31.174ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92e9cc26-eb15-4933-b512-66c45f9cf57d response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138482025-03-07T23:12:31.175ZINFOtest_unauthorized (external client test context): client received response status = 405
138492025-03-07T23:12:31.175ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
138502025-03-07T23:12:31.175ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/silos/demo-silo
138512025-03-07T23:12:31.175ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eef1ffc5-c5da-49af-85e7-deab68e12713 uri = /v1/system/ip-pools/default/silos/demo-silo
138522025-03-07T23:12:31.175ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eef1ffc5-c5da-49af-85e7-deab68e12713 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138532025-03-07T23:12:31.178ZINFOtest_unauthorized (external client test context): client received response status = 405
138542025-03-07T23:12:31.179ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/silos/demo-silo
138552025-03-07T23:12:31.179ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges
138562025-03-07T23:12:31.179ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/ranges
138572025-03-07T23:12:31.179ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
138582025-03-07T23:12:31.179ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 uri = /v1/system/ip-pools/default/ranges
138592025-03-07T23:12:31.179ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 uri = /v1/system/ip-pools/default/ranges
138602025-03-07T23:12:31.179ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges
138612025-03-07T23:12:31.179ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138622025-03-07T23:12:31.179ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138632025-03-07T23:12:31.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138642025-03-07T23:12:31.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138652025-03-07T23:12:31.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138662025-03-07T23:12:31.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138672025-03-07T23:12:31.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
138682025-03-07T23:12:31.180ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
138692025-03-07T23:12:31.186ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138702025-03-07T23:12:31.186ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138712025-03-07T23:12:31.186ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138722025-03-07T23:12:31.187ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
138732025-03-07T23:12:31.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138742025-03-07T23:12:31.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138752025-03-07T23:12:31.187ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138762025-03-07T23:12:31.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
138772025-03-07T23:12:31.187ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
138782025-03-07T23:12:31.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138792025-03-07T23:12:31.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138802025-03-07T23:12:31.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138812025-03-07T23:12:31.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
138822025-03-07T23:12:31.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
138832025-03-07T23:12:31.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138842025-03-07T23:12:31.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138852025-03-07T23:12:31.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138862025-03-07T23:12:31.196ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
138872025-03-07T23:12:31.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138882025-03-07T23:12:31.197ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138892025-03-07T23:12:31.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138902025-03-07T23:12:31.199ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
138912025-03-07T23:12:31.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
138922025-03-07T23:12:31.204ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 uri = /v1/system/ip-pools/default/ranges
138932025-03-07T23:12:31.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database uri = /v1/system/ip-pools/default/ranges
138942025-03-07T23:12:31.205ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
138952025-03-07T23:12:31.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
138962025-03-07T23:12:31.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
138972025-03-07T23:12:31.215ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
138982025-03-07T23:12:31.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database uri = /v1/system/ip-pools/default/ranges
138992025-03-07T23:12:31.221ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139002025-03-07T23:12:31.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139012025-03-07T23:12:31.227ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
139022025-03-07T23:12:31.227ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
139032025-03-07T23:12:31.228ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
139042025-03-07T23:12:31.230ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
139052025-03-07T23:12:31.232ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
139062025-03-07T23:12:31.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139072025-03-07T23:12:31.239ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database uri = /v1/system/ip-pools/default/ranges
139082025-03-07T23:12:31.240ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139092025-03-07T23:12:31.240ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139102025-03-07T23:12:31.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
139112025-03-07T23:12:31.243ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
139122025-03-07T23:12:31.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database uri = /v1/system/ip-pools/default/ranges
139132025-03-07T23:12:31.243ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139142025-03-07T23:12:31.244ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139152025-03-07T23:12:31.250ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
139162025-03-07T23:12:31.251ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
139172025-03-07T23:12:31.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
139182025-03-07T23:12:31.263ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139192025-03-07T23:12:31.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database uri = /v1/system/ip-pools/default/ranges
139202025-03-07T23:12:31.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139212025-03-07T23:12:31.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139222025-03-07T23:12:31.267ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
139232025-03-07T23:12:31.267ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
139242025-03-07T23:12:31.269ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 108439 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1963fe4c-97b5-48d1-b976-376d96cce970 response_code = 200 uri = /v1/system/ip-pools/default/ranges
139252025-03-07T23:12:31.271ZINFOtest_unauthorized (external client test context): client received response status = 200
139262025-03-07T23:12:31.272ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges
139272025-03-07T23:12:31.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
139282025-03-07T23:12:31.273ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a uri = /v1/system/ip-pools/default/ranges
139292025-03-07T23:12:31.274ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a uri = /v1/system/ip-pools/default/ranges
139302025-03-07T23:12:31.274ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges
139312025-03-07T23:12:31.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139322025-03-07T23:12:31.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139332025-03-07T23:12:31.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139342025-03-07T23:12:31.277ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139352025-03-07T23:12:31.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139362025-03-07T23:12:31.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139372025-03-07T23:12:31.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
139382025-03-07T23:12:31.281ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
139392025-03-07T23:12:31.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139402025-03-07T23:12:31.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139412025-03-07T23:12:31.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139422025-03-07T23:12:31.285ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
139432025-03-07T23:12:31.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139442025-03-07T23:12:31.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139452025-03-07T23:12:31.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139462025-03-07T23:12:31.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
139472025-03-07T23:12:31.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
139482025-03-07T23:12:31.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139492025-03-07T23:12:31.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139502025-03-07T23:12:31.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139512025-03-07T23:12:31.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
139522025-03-07T23:12:31.302ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
139532025-03-07T23:12:31.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139542025-03-07T23:12:31.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139552025-03-07T23:12:31.303ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139562025-03-07T23:12:31.308ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
139572025-03-07T23:12:31.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139582025-03-07T23:12:31.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139592025-03-07T23:12:31.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139602025-03-07T23:12:31.313ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
139612025-03-07T23:12:31.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
139622025-03-07T23:12:31.315ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a uri = /v1/system/ip-pools/default/ranges
139632025-03-07T23:12:31.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = Database uri = /v1/system/ip-pools/default/ranges
139642025-03-07T23:12:31.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139652025-03-07T23:12:31.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139662025-03-07T23:12:31.330ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
139672025-03-07T23:12:31.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
139682025-03-07T23:12:31.336ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
139692025-03-07T23:12:31.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = Database uri = /v1/system/ip-pools/default/ranges
139702025-03-07T23:12:31.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139712025-03-07T23:12:31.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
139722025-03-07T23:12:31.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139732025-03-07T23:12:31.371ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges
139742025-03-07T23:12:31.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 113268 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e0352360-d86d-4a26-8a42-118c7d6bb15a response_code = 404 uri = /v1/system/ip-pools/default/ranges
139752025-03-07T23:12:31.392ZINFOtest_unauthorized (external client test context): client received response status = 404
139762025-03-07T23:12:31.393ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges
139772025-03-07T23:12:31.393ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
139782025-03-07T23:12:31.393ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 uri = /v1/system/ip-pools/default/ranges
139792025-03-07T23:12:31.393ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 uri = /v1/system/ip-pools/default/ranges
139802025-03-07T23:12:31.393ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 uri = /v1/system/ip-pools/default/ranges
139812025-03-07T23:12:31.393ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 uri = /v1/system/ip-pools/default/ranges
139822025-03-07T23:12:31.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 resource = Database uri = /v1/system/ip-pools/default/ranges
139832025-03-07T23:12:31.393ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
139842025-03-07T23:12:31.394ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges
139852025-03-07T23:12:31.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1040 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e1909d45-8c18-4ead-b936-51b93070c3a4 response_code = 401 uri = /v1/system/ip-pools/default/ranges
139862025-03-07T23:12:31.396ZINFOtest_unauthorized (external client test context): client received response status = 401
139872025-03-07T23:12:31.396ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges
139882025-03-07T23:12:31.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
139892025-03-07T23:12:31.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ba8bc27b-f976-478d-91a8-c9835da376fc uri = /v1/system/ip-pools/default/ranges
139902025-03-07T23:12:31.396ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ba8bc27b-f976-478d-91a8-c9835da376fc uri = /v1/system/ip-pools/default/ranges
139912025-03-07T23:12:31.396ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ba8bc27b-f976-478d-91a8-c9835da376fc uri = /v1/system/ip-pools/default/ranges
139922025-03-07T23:12:31.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 203 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ba8bc27b-f976-478d-91a8-c9835da376fc response_code = 401 uri = /v1/system/ip-pools/default/ranges
139932025-03-07T23:12:31.396ZINFOtest_unauthorized (external client test context): client received response status = 401
139942025-03-07T23:12:31.396ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges
139952025-03-07T23:12:31.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
139962025-03-07T23:12:31.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a6a06c85-de44-4d03-994a-22d1afabcff1 uri = /v1/system/ip-pools/default/ranges
139972025-03-07T23:12:31.400ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a6a06c85-de44-4d03-994a-22d1afabcff1 uri = /v1/system/ip-pools/default/ranges
139982025-03-07T23:12:31.401ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1371:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1403:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a6a06c85-de44-4d03-994a-22d1afabcff1 uri = /v1/system/ip-pools/default/ranges
139992025-03-07T23:12:31.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5497 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a6a06c85-de44-4d03-994a-22d1afabcff1 response_code = 401 uri = /v1/system/ip-pools/default/ranges
140002025-03-07T23:12:31.401ZINFOtest_unauthorized (external client test context): client received response status = 401
140012025-03-07T23:12:31.401ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges
140022025-03-07T23:12:31.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140032025-03-07T23:12:31.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = abdae3af-7222-4f2b-a91a-852fac5ad361 uri = /v1/system/ip-pools/default/ranges
140042025-03-07T23:12:31.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = abdae3af-7222-4f2b-a91a-852fac5ad361 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140052025-03-07T23:12:31.402ZINFOtest_unauthorized (external client test context): client received response status = 405
140062025-03-07T23:12:31.402ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges
140072025-03-07T23:12:31.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140082025-03-07T23:12:31.402ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 716df6c6-5558-49c3-87e8-e7ae097e8e61 uri = /v1/system/ip-pools/default/ranges
140092025-03-07T23:12:31.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 716df6c6-5558-49c3-87e8-e7ae097e8e61 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140102025-03-07T23:12:31.402ZINFOtest_unauthorized (external client test context): client received response status = 405
140112025-03-07T23:12:31.404ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges
140122025-03-07T23:12:31.404ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140132025-03-07T23:12:31.405ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64bfa89b-cdbd-4d6f-b024-3537b1529af9 uri = /v1/system/ip-pools/default/ranges
140142025-03-07T23:12:31.405ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 168 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64bfa89b-cdbd-4d6f-b024-3537b1529af9 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140152025-03-07T23:12:31.405ZINFOtest_unauthorized (external client test context): client received response status = 405
140162025-03-07T23:12:31.406ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges
140172025-03-07T23:12:31.406ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140182025-03-07T23:12:31.407ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 535ebd42-dd8c-4b95-9c8c-fa7808df4fc0 uri = /v1/system/ip-pools/default/ranges
140192025-03-07T23:12:31.407ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 535ebd42-dd8c-4b95-9c8c-fa7808df4fc0 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140202025-03-07T23:12:31.407ZINFOtest_unauthorized (external client test context): client received response status = 405
140212025-03-07T23:12:31.407ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges
140222025-03-07T23:12:31.407ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140232025-03-07T23:12:31.407ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3b3d393-94a5-4d7b-8591-9a6b803d6b99 uri = /v1/system/ip-pools/default/ranges
140242025-03-07T23:12:31.407ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3b3d393-94a5-4d7b-8591-9a6b803d6b99 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140252025-03-07T23:12:31.407ZINFOtest_unauthorized (external client test context): client received response status = 405
140262025-03-07T23:12:31.407ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges
140272025-03-07T23:12:31.407ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140282025-03-07T23:12:31.407ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d0c682c9-e490-4a0c-b062-5cc7860b1380 uri = /v1/system/ip-pools/default/ranges
140292025-03-07T23:12:31.409ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d0c682c9-e490-4a0c-b062-5cc7860b1380 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140302025-03-07T23:12:31.415ZINFOtest_unauthorized (external client test context): client received response status = 405
140312025-03-07T23:12:31.416ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges
140322025-03-07T23:12:31.416ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140332025-03-07T23:12:31.416ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e304e41c-ff11-4fef-b773-25be288fcad6 uri = /v1/system/ip-pools/default/ranges
140342025-03-07T23:12:31.416ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 324 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e304e41c-ff11-4fef-b773-25be288fcad6 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140352025-03-07T23:12:31.416ZINFOtest_unauthorized (external client test context): client received response status = 405
140362025-03-07T23:12:31.416ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges
140372025-03-07T23:12:31.417ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140382025-03-07T23:12:31.417ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f63a624d-9fc9-4e37-8b9c-cf7b4636c4b1 uri = /v1/system/ip-pools/default/ranges
140392025-03-07T23:12:31.417ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f63a624d-9fc9-4e37-8b9c-cf7b4636c4b1 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140402025-03-07T23:12:31.417ZINFOtest_unauthorized (external client test context): client received response status = 405
140412025-03-07T23:12:31.417ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges
140422025-03-07T23:12:31.417ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140432025-03-07T23:12:31.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0db0b9d-32fb-4e3f-a308-81531837e0e6 uri = /v1/system/ip-pools/default/ranges
140442025-03-07T23:12:31.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 141 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0db0b9d-32fb-4e3f-a308-81531837e0e6 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140452025-03-07T23:12:31.418ZINFOtest_unauthorized (external client test context): client received response status = 405
140462025-03-07T23:12:31.418ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges
140472025-03-07T23:12:31.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140482025-03-07T23:12:31.419ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f8765d91-44e8-4d69-ac49-7299451becfc uri = /v1/system/ip-pools/default/ranges
140492025-03-07T23:12:31.419ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 198 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f8765d91-44e8-4d69-ac49-7299451becfc response_code = 405 uri = /v1/system/ip-pools/default/ranges
140502025-03-07T23:12:31.419ZINFOtest_unauthorized (external client test context): client received response status = 405
140512025-03-07T23:12:31.419ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges
140522025-03-07T23:12:31.419ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140532025-03-07T23:12:31.419ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e00837e5-a3c4-442a-998d-d905ac94f1ea uri = /v1/system/ip-pools/default/ranges
140542025-03-07T23:12:31.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 167 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e00837e5-a3c4-442a-998d-d905ac94f1ea response_code = 405 uri = /v1/system/ip-pools/default/ranges
140552025-03-07T23:12:31.420ZINFOtest_unauthorized (external client test context): client received response status = 405
140562025-03-07T23:12:31.420ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges
140572025-03-07T23:12:31.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140582025-03-07T23:12:31.421ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c3912323-a74f-4364-a653-3f476857daf5 uri = /v1/system/ip-pools/default/ranges
140592025-03-07T23:12:31.421ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 176 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c3912323-a74f-4364-a653-3f476857daf5 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140602025-03-07T23:12:31.421ZINFOtest_unauthorized (external client test context): client received response status = 405
140612025-03-07T23:12:31.421ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges
140622025-03-07T23:12:31.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140632025-03-07T23:12:31.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1df66e4e-0f07-4c3b-b093-6516b7403550 uri = /v1/system/ip-pools/default/ranges
140642025-03-07T23:12:31.422ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1df66e4e-0f07-4c3b-b093-6516b7403550 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140652025-03-07T23:12:31.422ZINFOtest_unauthorized (external client test context): client received response status = 405
140662025-03-07T23:12:31.423ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges
140672025-03-07T23:12:31.423ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140682025-03-07T23:12:31.423ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 40bb1833-ecc2-4673-9340-ef48187adc0b uri = /v1/system/ip-pools/default/ranges
140692025-03-07T23:12:31.424ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 40bb1833-ecc2-4673-9340-ef48187adc0b response_code = 405 uri = /v1/system/ip-pools/default/ranges
140702025-03-07T23:12:31.424ZINFOtest_unauthorized (external client test context): client received response status = 405
140712025-03-07T23:12:31.424ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges
140722025-03-07T23:12:31.424ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140732025-03-07T23:12:31.424ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f4b01c6-e325-4677-876a-26997b646671 uri = /v1/system/ip-pools/default/ranges
140742025-03-07T23:12:31.424ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f4b01c6-e325-4677-876a-26997b646671 response_code = 405 uri = /v1/system/ip-pools/default/ranges
140752025-03-07T23:12:31.424ZINFOtest_unauthorized (external client test context): client received response status = 405
140762025-03-07T23:12:31.424ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges
140772025-03-07T23:12:31.424ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140782025-03-07T23:12:31.425ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 08ea48fa-1d93-4b39-9369-ff39d5eb4cff uri = /v1/system/ip-pools/default/ranges
140792025-03-07T23:12:31.425ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 08ea48fa-1d93-4b39-9369-ff39d5eb4cff response_code = 405 uri = /v1/system/ip-pools/default/ranges
140802025-03-07T23:12:31.425ZINFOtest_unauthorized (external client test context): client received response status = 405
140812025-03-07T23:12:31.425ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges
140822025-03-07T23:12:31.425ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges
140832025-03-07T23:12:31.425ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 uri = /v1/system/ip-pools/default/ranges
140842025-03-07T23:12:31.425ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 uri = /v1/system/ip-pools/default/ranges
140852025-03-07T23:12:31.425ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges
140862025-03-07T23:12:31.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140872025-03-07T23:12:31.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140882025-03-07T23:12:31.431ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140892025-03-07T23:12:31.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140902025-03-07T23:12:31.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140912025-03-07T23:12:31.435ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140922025-03-07T23:12:31.441ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
140932025-03-07T23:12:31.442ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
140942025-03-07T23:12:31.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140952025-03-07T23:12:31.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140962025-03-07T23:12:31.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140972025-03-07T23:12:31.447ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
140982025-03-07T23:12:31.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140992025-03-07T23:12:31.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141002025-03-07T23:12:31.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141012025-03-07T23:12:31.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
141022025-03-07T23:12:31.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
141032025-03-07T23:12:31.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141042025-03-07T23:12:31.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141052025-03-07T23:12:31.458ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141062025-03-07T23:12:31.472ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
141072025-03-07T23:12:31.473ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
141082025-03-07T23:12:31.473ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
141092025-03-07T23:12:31.477ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
141102025-03-07T23:12:31.478ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
141112025-03-07T23:12:31.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141122025-03-07T23:12:31.478ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141132025-03-07T23:12:31.479ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141142025-03-07T23:12:31.480ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
141152025-03-07T23:12:31.480ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141162025-03-07T23:12:31.481ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141172025-03-07T23:12:31.482ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141182025-03-07T23:12:31.487ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
141192025-03-07T23:12:31.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
141202025-03-07T23:12:31.492ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 uri = /v1/system/ip-pools/default/ranges
141212025-03-07T23:12:31.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database uri = /v1/system/ip-pools/default/ranges
141222025-03-07T23:12:31.494ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141232025-03-07T23:12:31.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141242025-03-07T23:12:31.503ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
141252025-03-07T23:12:31.503ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
141262025-03-07T23:12:31.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database uri = /v1/system/ip-pools/default/ranges
141272025-03-07T23:12:31.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141282025-03-07T23:12:31.506ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141292025-03-07T23:12:31.537ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
141302025-03-07T23:12:31.544ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141312025-03-07T23:12:31.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database uri = /v1/system/ip-pools/default/ranges
141322025-03-07T23:12:31.546ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141332025-03-07T23:12:31.546ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141342025-03-07T23:12:31.547ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
141352025-03-07T23:12:31.547ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
141362025-03-07T23:12:31.548ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
141372025-03-07T23:12:31.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
141382025-03-07T23:12:31.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
141392025-03-07T23:12:31.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database uri = /v1/system/ip-pools/default/ranges
141402025-03-07T23:12:31.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141412025-03-07T23:12:31.550ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141422025-03-07T23:12:31.554ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
141432025-03-07T23:12:31.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141442025-03-07T23:12:31.573ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database uri = /v1/system/ip-pools/default/ranges
141452025-03-07T23:12:31.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141462025-03-07T23:12:31.576ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141472025-03-07T23:12:31.576ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
141482025-03-07T23:12:31.576ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141492025-03-07T23:12:31.577ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c2888b4f-98a5-413e-bb2b-68bd06d0345f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141502025-03-07T23:12:31.578ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c2888b4f-98a5-413e-bb2b-68bd06d0345f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141512025-03-07T23:12:31.579ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c2888b4f-98a5-413e-bb2b-68bd06d0345f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141522025-03-07T23:12:31.579ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c2888b4f-98a5-413e-bb2b-68bd06d0345f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141532025-03-07T23:12:31.580ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 155581 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ad58b0-fa20-45bf-aa9e-69c3b6818cc0 response_code = 200 uri = /v1/system/ip-pools/default/ranges
141542025-03-07T23:12:31.581ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3803 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c2888b4f-98a5-413e-bb2b-68bd06d0345f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
141552025-03-07T23:12:31.582ZINFOtest_unauthorized (external client test context): client received response status = 200
141562025-03-07T23:12:31.582ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges/add
141572025-03-07T23:12:31.582ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/ranges/add
141582025-03-07T23:12:31.582ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges/add
141592025-03-07T23:12:31.582ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
141602025-03-07T23:12:31.582ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c2888b4f-98a5-413e-bb2b-68bd06d0345f", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:31 GMT"} })
141612025-03-07T23:12:31.582ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141622025-03-07T23:12:31.582ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3ddc8db-18ba-4982-a8ca-0c8b897182da uri = /v1/system/ip-pools/default/ranges/add
141632025-03-07T23:12:31.582ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3ddc8db-18ba-4982-a8ca-0c8b897182da response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
141642025-03-07T23:12:31.582ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c092096a-e502-4b7f-9b71-5b658a8dd2b1 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141652025-03-07T23:12:31.582ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c092096a-e502-4b7f-9b71-5b658a8dd2b1 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141662025-03-07T23:12:31.583ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c092096a-e502-4b7f-9b71-5b658a8dd2b1 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141672025-03-07T23:12:31.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c092096a-e502-4b7f-9b71-5b658a8dd2b1 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141682025-03-07T23:12:31.586ZINFOtest_unauthorized (external client test context): client received response status = 405
141692025-03-07T23:12:31.586ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges/add
141702025-03-07T23:12:31.586ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
141712025-03-07T23:12:31.586ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 39e149d6-7c5a-4521-b7c8-97decdd7a222 uri = /v1/system/ip-pools/default/ranges/add
141722025-03-07T23:12:31.586ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 39e149d6-7c5a-4521-b7c8-97decdd7a222 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
141732025-03-07T23:12:31.586ZINFOtest_unauthorized (external client test context): client received response status = 405
141742025-03-07T23:12:31.587ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges/add
141752025-03-07T23:12:31.588ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
141762025-03-07T23:12:31.588ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = af8b6fa7-9408-40fc-bb88-3426a39749a6 uri = /v1/system/ip-pools/default/ranges/add
141772025-03-07T23:12:31.588ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = af8b6fa7-9408-40fc-bb88-3426a39749a6 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
141782025-03-07T23:12:31.588ZINFOtest_unauthorized (external client test context): client received response status = 405
141792025-03-07T23:12:31.588ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges/add
141802025-03-07T23:12:31.588ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
141812025-03-07T23:12:31.588ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f42e5229-a572-4a74-968d-91770f5e1033 uri = /v1/system/ip-pools/default/ranges/add
141822025-03-07T23:12:31.588ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f42e5229-a572-4a74-968d-91770f5e1033 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
141832025-03-07T23:12:31.588ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4005 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = c092096a-e502-4b7f-9b71-5b658a8dd2b1 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
141842025-03-07T23:12:31.588ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "c092096a-e502-4b7f-9b71-5b658a8dd2b1", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:31 GMT"} })
141852025-03-07T23:12:31.588ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141862025-03-07T23:12:31.589ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
141872025-03-07T23:12:31.589ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
141882025-03-07T23:12:31.589ZINFOtest_unauthorized (external client test context): client received response status = 405
141892025-03-07T23:12:31.589ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges/add
141902025-03-07T23:12:31.589ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
141912025-03-07T23:12:31.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141922025-03-07T23:12:31.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141932025-03-07T23:12:31.590ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba98ac4e-fa6f-4e4f-bdb0-ec6c35057f3f uri = /v1/system/ip-pools/default/ranges/add
141942025-03-07T23:12:31.590ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba98ac4e-fa6f-4e4f-bdb0-ec6c35057f3f response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
141952025-03-07T23:12:31.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141962025-03-07T23:12:31.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141972025-03-07T23:12:31.590ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141982025-03-07T23:12:31.590ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
141992025-03-07T23:12:31.590ZINFOtest_unauthorized (external client test context): client received response status = 405
142002025-03-07T23:12:31.591ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges/add
142012025-03-07T23:12:31.591ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142022025-03-07T23:12:31.591ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 229b2c1d-fae6-4394-b6ec-a8c953047c89 uri = /v1/system/ip-pools/default/ranges/add
142032025-03-07T23:12:31.591ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 141 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 229b2c1d-fae6-4394-b6ec-a8c953047c89 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
142042025-03-07T23:12:31.594ZINFOtest_unauthorized (external client test context): client received response status = 405
142052025-03-07T23:12:31.594ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges/add
142062025-03-07T23:12:31.594ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142072025-03-07T23:12:31.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 68c3a903-066b-43c2-8adb-2062fdc235cb uri = /v1/system/ip-pools/default/ranges/add
142082025-03-07T23:12:31.595ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 672 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 68c3a903-066b-43c2-8adb-2062fdc235cb response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
142092025-03-07T23:12:31.595ZINFOtest_unauthorized (external client test context): client received response status = 405
142102025-03-07T23:12:31.595ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges/add
142112025-03-07T23:12:31.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142122025-03-07T23:12:31.596ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 94aed90d-ddb9-4d57-a656-6d76646e2db7 uri = /v1/system/ip-pools/default/ranges/add
142132025-03-07T23:12:31.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 94aed90d-ddb9-4d57-a656-6d76646e2db7 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
142142025-03-07T23:12:31.599ZINFOtest_unauthorized (external client test context): client received response status = 405
142152025-03-07T23:12:31.599ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges/add
142162025-03-07T23:12:31.600ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142172025-03-07T23:12:31.600ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 uri = /v1/system/ip-pools/default/ranges/add
142182025-03-07T23:12:31.600ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 uri = /v1/system/ip-pools/default/ranges/add
142192025-03-07T23:12:31.600ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges/add
142202025-03-07T23:12:31.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142212025-03-07T23:12:31.600ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142222025-03-07T23:12:31.600ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142232025-03-07T23:12:31.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142242025-03-07T23:12:31.600ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142252025-03-07T23:12:31.601ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142262025-03-07T23:12:31.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
142272025-03-07T23:12:31.604ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
142282025-03-07T23:12:31.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142292025-03-07T23:12:31.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142302025-03-07T23:12:31.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142312025-03-07T23:12:31.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
142322025-03-07T23:12:31.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142332025-03-07T23:12:31.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142342025-03-07T23:12:31.607ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142352025-03-07T23:12:31.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
142362025-03-07T23:12:31.613ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
142372025-03-07T23:12:31.613ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142382025-03-07T23:12:31.613ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142392025-03-07T23:12:31.614ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142402025-03-07T23:12:31.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
142412025-03-07T23:12:31.617ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
142422025-03-07T23:12:31.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142432025-03-07T23:12:31.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142442025-03-07T23:12:31.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142452025-03-07T23:12:31.619ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
142462025-03-07T23:12:31.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142472025-03-07T23:12:31.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142482025-03-07T23:12:31.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142492025-03-07T23:12:31.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
142502025-03-07T23:12:31.630ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
142512025-03-07T23:12:31.630ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 uri = /v1/system/ip-pools/default/ranges/add
142522025-03-07T23:12:31.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = Database uri = /v1/system/ip-pools/default/ranges/add
142532025-03-07T23:12:31.632ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
142542025-03-07T23:12:31.632ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
142552025-03-07T23:12:31.634ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
142562025-03-07T23:12:31.637ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
142572025-03-07T23:12:31.637ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
142582025-03-07T23:12:31.637ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
142592025-03-07T23:12:31.637ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
142602025-03-07T23:12:31.637ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = Database uri = /v1/system/ip-pools/default/ranges/add
142612025-03-07T23:12:31.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
142622025-03-07T23:12:31.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
142632025-03-07T23:12:31.641ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
142642025-03-07T23:12:31.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges/add
142652025-03-07T23:12:31.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 55901 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5436115-f287-435a-9bec-17b572d540c8 response_code = 404 uri = /v1/system/ip-pools/default/ranges/add
142662025-03-07T23:12:31.655ZINFOtest_unauthorized (external client test context): client received response status = 404
142672025-03-07T23:12:31.655ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges/add
142682025-03-07T23:12:31.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142692025-03-07T23:12:31.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 uri = /v1/system/ip-pools/default/ranges/add
142702025-03-07T23:12:31.656ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 uri = /v1/system/ip-pools/default/ranges/add
142712025-03-07T23:12:31.656ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 uri = /v1/system/ip-pools/default/ranges/add
142722025-03-07T23:12:31.656ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 uri = /v1/system/ip-pools/default/ranges/add
142732025-03-07T23:12:31.656ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 resource = Database uri = /v1/system/ip-pools/default/ranges/add
142742025-03-07T23:12:31.656ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
142752025-03-07T23:12:31.657ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges/add
142762025-03-07T23:12:31.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 3393 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e2c7ace1-a69d-4694-9dea-701d6ae204c2 response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
142772025-03-07T23:12:31.658ZINFOtest_unauthorized (external client test context): client received response status = 401
142782025-03-07T23:12:31.658ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges/add
142792025-03-07T23:12:31.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142802025-03-07T23:12:31.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a6f569a-a5a0-4e43-94cb-c8089b5b5310 uri = /v1/system/ip-pools/default/ranges/add
142812025-03-07T23:12:31.664ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a6f569a-a5a0-4e43-94cb-c8089b5b5310 uri = /v1/system/ip-pools/default/ranges/add
142822025-03-07T23:12:31.664ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a6f569a-a5a0-4e43-94cb-c8089b5b5310 uri = /v1/system/ip-pools/default/ranges/add
142832025-03-07T23:12:31.665ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 523 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a6f569a-a5a0-4e43-94cb-c8089b5b5310 response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
142842025-03-07T23:12:31.665ZINFOtest_unauthorized (external client test context): client received response status = 401
142852025-03-07T23:12:31.665ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges/add
142862025-03-07T23:12:31.665ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142872025-03-07T23:12:31.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b7c6acdb-e48f-4d62-a847-67bd037ac7e3 uri = /v1/system/ip-pools/default/ranges/add
142882025-03-07T23:12:31.666ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b7c6acdb-e48f-4d62-a847-67bd037ac7e3 uri = /v1/system/ip-pools/default/ranges/add
142892025-03-07T23:12:31.666ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1414:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1427:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b7c6acdb-e48f-4d62-a847-67bd037ac7e3 uri = /v1/system/ip-pools/default/ranges/add
142902025-03-07T23:12:31.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 995 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b7c6acdb-e48f-4d62-a847-67bd037ac7e3 response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
142912025-03-07T23:12:31.667ZINFOtest_unauthorized (external client test context): client received response status = 401
142922025-03-07T23:12:31.667ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges/add
142932025-03-07T23:12:31.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142942025-03-07T23:12:31.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0b329da4-c825-4c36-b959-7880a64bdf9c uri = /v1/system/ip-pools/default/ranges/add
142952025-03-07T23:12:31.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0b329da4-c825-4c36-b959-7880a64bdf9c response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
142962025-03-07T23:12:31.667ZINFOtest_unauthorized (external client test context): client received response status = 405
142972025-03-07T23:12:31.667ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges/add
142982025-03-07T23:12:31.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
142992025-03-07T23:12:31.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1abcd25-da41-460f-8c49-207e8734fe6f uri = /v1/system/ip-pools/default/ranges/add
143002025-03-07T23:12:31.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1abcd25-da41-460f-8c49-207e8734fe6f response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143012025-03-07T23:12:31.667ZINFOtest_unauthorized (external client test context): client received response status = 405
143022025-03-07T23:12:31.667ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges/add
143032025-03-07T23:12:31.668ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143042025-03-07T23:12:31.668ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 58c5bf6a-3c42-4fe3-b6f1-dd5b764e2642 uri = /v1/system/ip-pools/default/ranges/add
143052025-03-07T23:12:31.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 58c5bf6a-3c42-4fe3-b6f1-dd5b764e2642 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143062025-03-07T23:12:31.670ZINFOtest_unauthorized (external client test context): client received response status = 405
143072025-03-07T23:12:31.671ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges/add
143082025-03-07T23:12:31.673ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143092025-03-07T23:12:31.673ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 49c6f55b-e665-4357-8bec-92f5acb372fe uri = /v1/system/ip-pools/default/ranges/add
143102025-03-07T23:12:31.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 49c6f55b-e665-4357-8bec-92f5acb372fe response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143112025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client received response status = 405
143122025-03-07T23:12:31.674ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges/add
143132025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143142025-03-07T23:12:31.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dbfd93a4-683c-4c0a-abb0-b2df7cc91b94 uri = /v1/system/ip-pools/default/ranges/add
143152025-03-07T23:12:31.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dbfd93a4-683c-4c0a-abb0-b2df7cc91b94 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143162025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client received response status = 405
143172025-03-07T23:12:31.674ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges/add
143182025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143192025-03-07T23:12:31.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 23d93a20-ff91-4c32-988d-9bb98ad584b3 uri = /v1/system/ip-pools/default/ranges/add
143202025-03-07T23:12:31.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 23d93a20-ff91-4c32-988d-9bb98ad584b3 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143212025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client received response status = 405
143222025-03-07T23:12:31.674ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges/add
143232025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143242025-03-07T23:12:31.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5dfa304a-a461-4557-b0a5-9c9ec1156fcd uri = /v1/system/ip-pools/default/ranges/add
143252025-03-07T23:12:31.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5dfa304a-a461-4557-b0a5-9c9ec1156fcd response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143262025-03-07T23:12:31.674ZINFOtest_unauthorized (external client test context): client received response status = 405
143272025-03-07T23:12:31.674ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges/add
143282025-03-07T23:12:31.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/add
143292025-03-07T23:12:31.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6a6c1f6-19fd-43bd-8142-fae7a1160eb0 uri = /v1/system/ip-pools/default/ranges/add
143302025-03-07T23:12:31.676ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6a6c1f6-19fd-43bd-8142-fae7a1160eb0 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143312025-03-07T23:12:31.678ZINFOtest_unauthorized (external client test context): client received response status = 405
143322025-03-07T23:12:31.678ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges/add
143332025-03-07T23:12:31.679ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges/remove
143342025-03-07T23:12:31.679ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/ranges/remove
143352025-03-07T23:12:31.679ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges/remove
143362025-03-07T23:12:31.679ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143372025-03-07T23:12:31.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 40e9e465-9748-455f-b744-9d5b53f97284 uri = /v1/system/ip-pools/default/ranges/remove
143382025-03-07T23:12:31.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 40e9e465-9748-455f-b744-9d5b53f97284 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143392025-03-07T23:12:31.679ZINFOtest_unauthorized (external client test context): client received response status = 405
143402025-03-07T23:12:31.680ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges/remove
143412025-03-07T23:12:31.680ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143422025-03-07T23:12:31.680ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62c613a0-491b-4a83-a10b-10912de28f78 uri = /v1/system/ip-pools/default/ranges/remove
143432025-03-07T23:12:31.680ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 125 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62c613a0-491b-4a83-a10b-10912de28f78 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143442025-03-07T23:12:31.680ZINFOtest_unauthorized (external client test context): client received response status = 405
143452025-03-07T23:12:31.680ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges/remove
143462025-03-07T23:12:31.680ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143472025-03-07T23:12:31.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 568f5024-b0d5-43f6-af13-61e1413f9d8c uri = /v1/system/ip-pools/default/ranges/remove
143482025-03-07T23:12:31.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 568f5024-b0d5-43f6-af13-61e1413f9d8c response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143492025-03-07T23:12:31.688ZINFOtest_unauthorized (external client test context): client received response status = 405
143502025-03-07T23:12:31.688ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges/remove
143512025-03-07T23:12:31.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143522025-03-07T23:12:31.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 733a1451-561d-476d-8636-cd00f5a0109d uri = /v1/system/ip-pools/default/ranges/remove
143532025-03-07T23:12:31.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 733a1451-561d-476d-8636-cd00f5a0109d response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143542025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client received response status = 405
143552025-03-07T23:12:31.689ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges/remove
143562025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143572025-03-07T23:12:31.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a6d30ab9-dda8-47e0-a1ac-cd38dfabf92d uri = /v1/system/ip-pools/default/ranges/remove
143582025-03-07T23:12:31.689ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a6d30ab9-dda8-47e0-a1ac-cd38dfabf92d response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143592025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client received response status = 405
143602025-03-07T23:12:31.689ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges/remove
143612025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143622025-03-07T23:12:31.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f8bb2359-d176-4262-9d6f-99ea6eaf7b40 uri = /v1/system/ip-pools/default/ranges/remove
143632025-03-07T23:12:31.689ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f8bb2359-d176-4262-9d6f-99ea6eaf7b40 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143642025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client received response status = 405
143652025-03-07T23:12:31.689ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges/remove
143662025-03-07T23:12:31.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143672025-03-07T23:12:31.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1cfee2ff-f213-4b15-bb3a-70e496d8185d uri = /v1/system/ip-pools/default/ranges/remove
143682025-03-07T23:12:31.689ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1cfee2ff-f213-4b15-bb3a-70e496d8185d response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143692025-03-07T23:12:31.690ZINFOtest_unauthorized (external client test context): client received response status = 405
143702025-03-07T23:12:31.690ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges/remove
143712025-03-07T23:12:31.690ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143722025-03-07T23:12:31.693ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3e38d39c-a50f-4a47-ba94-cd72a2a1ccdb uri = /v1/system/ip-pools/default/ranges/remove
143732025-03-07T23:12:31.693ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3e38d39c-a50f-4a47-ba94-cd72a2a1ccdb response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
143742025-03-07T23:12:31.693ZINFOtest_unauthorized (external client test context): client received response status = 405
143752025-03-07T23:12:31.693ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges/remove
143762025-03-07T23:12:31.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
143772025-03-07T23:12:31.693ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 uri = /v1/system/ip-pools/default/ranges/remove
143782025-03-07T23:12:31.693ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 uri = /v1/system/ip-pools/default/ranges/remove
143792025-03-07T23:12:31.693ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges/remove
143802025-03-07T23:12:31.693ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143812025-03-07T23:12:31.693ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143822025-03-07T23:12:31.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143832025-03-07T23:12:31.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143842025-03-07T23:12:31.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143852025-03-07T23:12:31.714ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143862025-03-07T23:12:31.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
143872025-03-07T23:12:31.720ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
143882025-03-07T23:12:31.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143892025-03-07T23:12:31.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143902025-03-07T23:12:31.721ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143912025-03-07T23:12:31.723ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
143922025-03-07T23:12:31.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143932025-03-07T23:12:31.724ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143942025-03-07T23:12:31.724ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143952025-03-07T23:12:31.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
143962025-03-07T23:12:31.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
143972025-03-07T23:12:31.737ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143982025-03-07T23:12:31.737ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143992025-03-07T23:12:31.737ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
144002025-03-07T23:12:31.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
144012025-03-07T23:12:31.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
144022025-03-07T23:12:31.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
144032025-03-07T23:12:31.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
144042025-03-07T23:12:31.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
144052025-03-07T23:12:31.744ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
144062025-03-07T23:12:31.745ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
144072025-03-07T23:12:31.745ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
144082025-03-07T23:12:31.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
144092025-03-07T23:12:31.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
144102025-03-07T23:12:31.752ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
144112025-03-07T23:12:31.754ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 uri = /v1/system/ip-pools/default/ranges/remove
144122025-03-07T23:12:31.754ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = Database uri = /v1/system/ip-pools/default/ranges/remove
144132025-03-07T23:12:31.754ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
144142025-03-07T23:12:31.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/remove
144152025-03-07T23:12:31.755ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/remove
144162025-03-07T23:12:31.756ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/remove
144172025-03-07T23:12:31.756ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = Database uri = /v1/system/ip-pools/default/ranges/remove
144182025-03-07T23:12:31.756ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
144192025-03-07T23:12:31.758ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/remove
144202025-03-07T23:12:31.763ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
144212025-03-07T23:12:31.775ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges/remove
144222025-03-07T23:12:31.776ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 92155 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3c06c444-8bed-497b-8694-63bba37c9355 response_code = 404 uri = /v1/system/ip-pools/default/ranges/remove
144232025-03-07T23:12:31.777ZINFOtest_unauthorized (external client test context): client received response status = 404
144242025-03-07T23:12:31.777ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges/remove
144252025-03-07T23:12:31.777ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144262025-03-07T23:12:31.783ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 uri = /v1/system/ip-pools/default/ranges/remove
144272025-03-07T23:12:31.784ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 uri = /v1/system/ip-pools/default/ranges/remove
144282025-03-07T23:12:31.784ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 uri = /v1/system/ip-pools/default/ranges/remove
144292025-03-07T23:12:31.784ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 uri = /v1/system/ip-pools/default/ranges/remove
144302025-03-07T23:12:31.784ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 resource = Database uri = /v1/system/ip-pools/default/ranges/remove
144312025-03-07T23:12:31.784ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
144322025-03-07T23:12:31.785ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges/remove
144332025-03-07T23:12:31.785ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2010 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4a872f91-ac7f-4d7f-88c2-2d7866465452 response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
144342025-03-07T23:12:31.787ZINFOtest_unauthorized (external client test context): client received response status = 401
144352025-03-07T23:12:31.788ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges/remove
144362025-03-07T23:12:31.788ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144372025-03-07T23:12:31.789ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a28b898a-3508-45c9-9a99-31a5307751b8 uri = /v1/system/ip-pools/default/ranges/remove
144382025-03-07T23:12:31.791ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a28b898a-3508-45c9-9a99-31a5307751b8 uri = /v1/system/ip-pools/default/ranges/remove
144392025-03-07T23:12:31.791ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a28b898a-3508-45c9-9a99-31a5307751b8 uri = /v1/system/ip-pools/default/ranges/remove
144402025-03-07T23:12:31.791ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 2529 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a28b898a-3508-45c9-9a99-31a5307751b8 response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
144412025-03-07T23:12:31.792ZINFOtest_unauthorized (external client test context): client received response status = 401
144422025-03-07T23:12:31.792ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges/remove
144432025-03-07T23:12:31.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144442025-03-07T23:12:31.795ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9f331886-6f42-4c1f-aded-47beaab54c0f uri = /v1/system/ip-pools/default/ranges/remove
144452025-03-07T23:12:31.795ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9f331886-6f42-4c1f-aded-47beaab54c0f uri = /v1/system/ip-pools/default/ranges/remove
144462025-03-07T23:12:31.798ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1438:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1450:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9f331886-6f42-4c1f-aded-47beaab54c0f uri = /v1/system/ip-pools/default/ranges/remove
144472025-03-07T23:12:31.798ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1398 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9f331886-6f42-4c1f-aded-47beaab54c0f response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
144482025-03-07T23:12:31.798ZINFOtest_unauthorized (external client test context): client received response status = 401
144492025-03-07T23:12:31.803ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges/remove
144502025-03-07T23:12:31.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144512025-03-07T23:12:31.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cdfe840b-c709-4e9a-b079-6ed85afc6c1e uri = /v1/system/ip-pools/default/ranges/remove
144522025-03-07T23:12:31.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 84 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cdfe840b-c709-4e9a-b079-6ed85afc6c1e response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144532025-03-07T23:12:31.806ZINFOtest_unauthorized (external client test context): client received response status = 405
144542025-03-07T23:12:31.807ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges/remove
144552025-03-07T23:12:31.807ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144562025-03-07T23:12:31.812ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1686a4a5-fe09-4446-97ff-dbd45cf7ac60 uri = /v1/system/ip-pools/default/ranges/remove
144572025-03-07T23:12:31.812ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 257 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1686a4a5-fe09-4446-97ff-dbd45cf7ac60 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144582025-03-07T23:12:31.813ZINFOtest_unauthorized (external client test context): client received response status = 405
144592025-03-07T23:12:31.814ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges/remove
144602025-03-07T23:12:31.814ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144612025-03-07T23:12:31.814ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bbf3a721-f3ef-4e96-8e4c-6ce2047c6a2d uri = /v1/system/ip-pools/default/ranges/remove
144622025-03-07T23:12:31.814ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bbf3a721-f3ef-4e96-8e4c-6ce2047c6a2d response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144632025-03-07T23:12:31.815ZINFOtest_unauthorized (external client test context): client received response status = 405
144642025-03-07T23:12:31.815ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges/remove
144652025-03-07T23:12:31.815ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144662025-03-07T23:12:31.815ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 63043bd1-a296-4094-b256-cb4dd381863b uri = /v1/system/ip-pools/default/ranges/remove
144672025-03-07T23:12:31.816ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 63043bd1-a296-4094-b256-cb4dd381863b response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144682025-03-07T23:12:31.816ZINFOtest_unauthorized (external client test context): client received response status = 405
144692025-03-07T23:12:31.816ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges/remove
144702025-03-07T23:12:31.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144712025-03-07T23:12:31.816ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c4d2d9cd-2655-44f3-af82-750c0b8d507b uri = /v1/system/ip-pools/default/ranges/remove
144722025-03-07T23:12:31.816ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c4d2d9cd-2655-44f3-af82-750c0b8d507b response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144732025-03-07T23:12:31.816ZINFOtest_unauthorized (external client test context): client received response status = 405
144742025-03-07T23:12:31.816ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges/remove
144752025-03-07T23:12:31.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144762025-03-07T23:12:31.816ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a5876cb0-acaa-4118-ab58-96e2b05d8eca uri = /v1/system/ip-pools/default/ranges/remove
144772025-03-07T23:12:31.816ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a5876cb0-acaa-4118-ab58-96e2b05d8eca response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144782025-03-07T23:12:31.817ZINFOtest_unauthorized (external client test context): client received response status = 405
144792025-03-07T23:12:31.818ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges/remove
144802025-03-07T23:12:31.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144812025-03-07T23:12:31.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 98ea8c68-cee5-4159-8c8f-f9b210afc4ca uri = /v1/system/ip-pools/default/ranges/remove
144822025-03-07T23:12:31.818ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 98ea8c68-cee5-4159-8c8f-f9b210afc4ca response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144832025-03-07T23:12:31.818ZINFOtest_unauthorized (external client test context): client received response status = 405
144842025-03-07T23:12:31.818ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges/remove
144852025-03-07T23:12:31.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/ranges/remove
144862025-03-07T23:12:31.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0984d60f-fa40-44d8-b0e8-078dc976f366 uri = /v1/system/ip-pools/default/ranges/remove
144872025-03-07T23:12:31.818ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0984d60f-fa40-44d8-b0e8-078dc976f366 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144882025-03-07T23:12:31.818ZINFOtest_unauthorized (external client test context): client received response status = 405
144892025-03-07T23:12:31.818ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges/remove
144902025-03-07T23:12:31.818ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/utilization
144912025-03-07T23:12:31.818ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/utilization
144922025-03-07T23:12:31.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
144932025-03-07T23:12:31.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 uri = /v1/system/ip-pools/default/utilization
144942025-03-07T23:12:31.818ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 uri = /v1/system/ip-pools/default/utilization
144952025-03-07T23:12:31.818ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/utilization
144962025-03-07T23:12:31.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
144972025-03-07T23:12:31.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
144982025-03-07T23:12:31.819ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
144992025-03-07T23:12:31.828ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145002025-03-07T23:12:31.828ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145012025-03-07T23:12:31.829ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145022025-03-07T23:12:31.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
145032025-03-07T23:12:31.832ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145042025-03-07T23:12:31.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145052025-03-07T23:12:31.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145062025-03-07T23:12:31.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145072025-03-07T23:12:31.837ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145082025-03-07T23:12:31.837ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145092025-03-07T23:12:31.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145102025-03-07T23:12:31.839ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145112025-03-07T23:12:31.841ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
145122025-03-07T23:12:31.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
145132025-03-07T23:12:31.847ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145142025-03-07T23:12:31.847ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145152025-03-07T23:12:31.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145162025-03-07T23:12:31.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
145172025-03-07T23:12:31.848ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145182025-03-07T23:12:31.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145192025-03-07T23:12:31.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145202025-03-07T23:12:31.849ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145212025-03-07T23:12:31.851ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145222025-03-07T23:12:31.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145232025-03-07T23:12:31.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145242025-03-07T23:12:31.852ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145252025-03-07T23:12:31.854ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
145262025-03-07T23:12:31.858ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
145272025-03-07T23:12:31.858ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 uri = /v1/system/ip-pools/default/utilization
145282025-03-07T23:12:31.858ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145292025-03-07T23:12:31.858ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145302025-03-07T23:12:31.863ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145312025-03-07T23:12:31.868ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
145322025-03-07T23:12:31.868ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
145332025-03-07T23:12:31.868ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145342025-03-07T23:12:31.868ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145352025-03-07T23:12:31.869ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145362025-03-07T23:12:31.873ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
145372025-03-07T23:12:31.884ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145382025-03-07T23:12:31.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
145392025-03-07T23:12:31.885ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
145402025-03-07T23:12:31.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145412025-03-07T23:12:31.885ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145422025-03-07T23:12:31.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145432025-03-07T23:12:31.895ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
145442025-03-07T23:12:31.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145452025-03-07T23:12:31.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145462025-03-07T23:12:31.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145472025-03-07T23:12:31.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145482025-03-07T23:12:31.910ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
145492025-03-07T23:12:31.910ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
145502025-03-07T23:12:31.910ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145512025-03-07T23:12:31.910ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145522025-03-07T23:12:31.912ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145532025-03-07T23:12:31.915ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
145542025-03-07T23:12:31.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145552025-03-07T23:12:31.923ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
145562025-03-07T23:12:31.923ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
145572025-03-07T23:12:31.923ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145582025-03-07T23:12:31.923ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145592025-03-07T23:12:31.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145602025-03-07T23:12:31.926ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
145612025-03-07T23:12:31.932ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145622025-03-07T23:12:31.934ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database uri = /v1/system/ip-pools/default/utilization
145632025-03-07T23:12:31.934ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
145642025-03-07T23:12:31.934ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
145652025-03-07T23:12:31.937ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 119765 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94de222f-9eb4-4184-9011-5e321b5acc01 response_code = 200 uri = /v1/system/ip-pools/default/utilization
145662025-03-07T23:12:31.938ZINFOtest_unauthorized (external client test context): client received response status = 200
145672025-03-07T23:12:31.938ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/utilization
145682025-03-07T23:12:31.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
145692025-03-07T23:12:31.943ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 uri = /v1/system/ip-pools/default/utilization
145702025-03-07T23:12:31.944ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 uri = /v1/system/ip-pools/default/utilization
145712025-03-07T23:12:31.944ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/utilization
145722025-03-07T23:12:31.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145732025-03-07T23:12:31.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145742025-03-07T23:12:31.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145752025-03-07T23:12:31.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145762025-03-07T23:12:31.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145772025-03-07T23:12:31.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145782025-03-07T23:12:31.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
145792025-03-07T23:12:31.947ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145802025-03-07T23:12:31.948ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145812025-03-07T23:12:31.948ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145822025-03-07T23:12:31.948ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145832025-03-07T23:12:31.949ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145842025-03-07T23:12:31.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145852025-03-07T23:12:31.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145862025-03-07T23:12:31.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145872025-03-07T23:12:31.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
145882025-03-07T23:12:31.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
145892025-03-07T23:12:31.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145902025-03-07T23:12:31.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145912025-03-07T23:12:31.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145922025-03-07T23:12:31.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
145932025-03-07T23:12:31.968ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145942025-03-07T23:12:31.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145952025-03-07T23:12:31.969ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145962025-03-07T23:12:31.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145972025-03-07T23:12:31.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145982025-03-07T23:12:31.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145992025-03-07T23:12:31.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146002025-03-07T23:12:31.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146012025-03-07T23:12:31.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
146022025-03-07T23:12:31.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
146032025-03-07T23:12:31.990ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 uri = /v1/system/ip-pools/default/utilization
146042025-03-07T23:12:31.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = Database uri = /v1/system/ip-pools/default/utilization
146052025-03-07T23:12:31.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
146062025-03-07T23:12:31.992ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
146072025-03-07T23:12:31.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
146082025-03-07T23:12:31.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
146092025-03-07T23:12:31.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = Database uri = /v1/system/ip-pools/default/utilization
146102025-03-07T23:12:31.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
146112025-03-07T23:12:31.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
146122025-03-07T23:12:31.999ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
146132025-03-07T23:12:32.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/utilization
146142025-03-07T23:12:32.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 67630 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1e409bd0-9284-4e2a-8b4e-c3440ca01f76 response_code = 404 uri = /v1/system/ip-pools/default/utilization
146152025-03-07T23:12:32.007ZINFOtest_unauthorized (external client test context): client received response status = 404
146162025-03-07T23:12:32.007ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/utilization
146172025-03-07T23:12:32.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146182025-03-07T23:12:32.008ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 uri = /v1/system/ip-pools/default/utilization
146192025-03-07T23:12:32.008ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 uri = /v1/system/ip-pools/default/utilization
146202025-03-07T23:12:32.009ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 uri = /v1/system/ip-pools/default/utilization
146212025-03-07T23:12:32.009ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 uri = /v1/system/ip-pools/default/utilization
146222025-03-07T23:12:32.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 resource = Database uri = /v1/system/ip-pools/default/utilization
146232025-03-07T23:12:32.009ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
146242025-03-07T23:12:32.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/utilization
146252025-03-07T23:12:32.010ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 895 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 422325ed-18e5-4183-a8b4-174fb8529919 response_code = 401 uri = /v1/system/ip-pools/default/utilization
146262025-03-07T23:12:32.010ZINFOtest_unauthorized (external client test context): client received response status = 401
146272025-03-07T23:12:32.010ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/utilization
146282025-03-07T23:12:32.010ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146292025-03-07T23:12:32.010ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f413dd7c-51e9-49c8-80dd-d101a70acce3 uri = /v1/system/ip-pools/default/utilization
146302025-03-07T23:12:32.010ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f413dd7c-51e9-49c8-80dd-d101a70acce3 uri = /v1/system/ip-pools/default/utilization
146312025-03-07T23:12:32.010ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f413dd7c-51e9-49c8-80dd-d101a70acce3 uri = /v1/system/ip-pools/default/utilization
146322025-03-07T23:12:32.010ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 198 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f413dd7c-51e9-49c8-80dd-d101a70acce3 response_code = 401 uri = /v1/system/ip-pools/default/utilization
146332025-03-07T23:12:32.010ZINFOtest_unauthorized (external client test context): client received response status = 401
146342025-03-07T23:12:32.010ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/utilization
146352025-03-07T23:12:32.011ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146362025-03-07T23:12:32.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6acac314-f2ca-456e-ab2c-542a5e5fac8e uri = /v1/system/ip-pools/default/utilization
146372025-03-07T23:12:32.011ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6acac314-f2ca-456e-ab2c-542a5e5fac8e uri = /v1/system/ip-pools/default/utilization
146382025-03-07T23:12:32.013ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1200:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1214:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6acac314-f2ca-456e-ab2c-542a5e5fac8e uri = /v1/system/ip-pools/default/utilization
146392025-03-07T23:12:32.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 971 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6acac314-f2ca-456e-ab2c-542a5e5fac8e response_code = 401 uri = /v1/system/ip-pools/default/utilization
146402025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client received response status = 401
146412025-03-07T23:12:32.013ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/utilization
146422025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146432025-03-07T23:12:32.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 81f48df4-3f4a-4ad5-8672-04015d2eb454 uri = /v1/system/ip-pools/default/utilization
146442025-03-07T23:12:32.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 81f48df4-3f4a-4ad5-8672-04015d2eb454 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146452025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client received response status = 405
146462025-03-07T23:12:32.013ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/utilization
146472025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146482025-03-07T23:12:32.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bc627f86-f3ff-4cad-afba-31c1a59701c0 uri = /v1/system/ip-pools/default/utilization
146492025-03-07T23:12:32.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bc627f86-f3ff-4cad-afba-31c1a59701c0 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146502025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client received response status = 405
146512025-03-07T23:12:32.013ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/utilization
146522025-03-07T23:12:32.013ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146532025-03-07T23:12:32.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 857eb74a-bc05-42d0-8b1c-a2416a923ef2 uri = /v1/system/ip-pools/default/utilization
146542025-03-07T23:12:32.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 857eb74a-bc05-42d0-8b1c-a2416a923ef2 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146552025-03-07T23:12:32.014ZINFOtest_unauthorized (external client test context): client received response status = 405
146562025-03-07T23:12:32.015ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/utilization
146572025-03-07T23:12:32.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146582025-03-07T23:12:32.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e68978a-7ef0-4dd0-93ab-e4a93cf5660b uri = /v1/system/ip-pools/default/utilization
146592025-03-07T23:12:32.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e68978a-7ef0-4dd0-93ab-e4a93cf5660b response_code = 405 uri = /v1/system/ip-pools/default/utilization
146602025-03-07T23:12:32.015ZINFOtest_unauthorized (external client test context): client received response status = 405
146612025-03-07T23:12:32.015ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/utilization
146622025-03-07T23:12:32.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146632025-03-07T23:12:32.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4d18d65e-b55e-4c8c-af9b-468a6934b51d uri = /v1/system/ip-pools/default/utilization
146642025-03-07T23:12:32.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4d18d65e-b55e-4c8c-af9b-468a6934b51d response_code = 405 uri = /v1/system/ip-pools/default/utilization
146652025-03-07T23:12:32.016ZINFOtest_unauthorized (external client test context): client received response status = 405
146662025-03-07T23:12:32.017ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/utilization
146672025-03-07T23:12:32.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146682025-03-07T23:12:32.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1e3ddefb-5c0e-461a-8c14-cbab40cfcef3 uri = /v1/system/ip-pools/default/utilization
146692025-03-07T23:12:32.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1e3ddefb-5c0e-461a-8c14-cbab40cfcef3 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146702025-03-07T23:12:32.017ZINFOtest_unauthorized (external client test context): client received response status = 405
146712025-03-07T23:12:32.017ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/utilization
146722025-03-07T23:12:32.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146732025-03-07T23:12:32.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b20686d3-71cd-40d4-904a-7aa9ec44e8fc uri = /v1/system/ip-pools/default/utilization
146742025-03-07T23:12:32.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b20686d3-71cd-40d4-904a-7aa9ec44e8fc response_code = 405 uri = /v1/system/ip-pools/default/utilization
146752025-03-07T23:12:32.017ZINFOtest_unauthorized (external client test context): client received response status = 405
146762025-03-07T23:12:32.017ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/utilization
146772025-03-07T23:12:32.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146782025-03-07T23:12:32.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1cc5863c-2b06-46e7-80fa-0b854dae5aa2 uri = /v1/system/ip-pools/default/utilization
146792025-03-07T23:12:32.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1cc5863c-2b06-46e7-80fa-0b854dae5aa2 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146802025-03-07T23:12:32.018ZINFOtest_unauthorized (external client test context): client received response status = 405
146812025-03-07T23:12:32.019ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/utilization
146822025-03-07T23:12:32.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146832025-03-07T23:12:32.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 868e0bcf-0269-4b76-94a2-99924ff450e5 uri = /v1/system/ip-pools/default/utilization
146842025-03-07T23:12:32.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 868e0bcf-0269-4b76-94a2-99924ff450e5 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146852025-03-07T23:12:32.019ZINFOtest_unauthorized (external client test context): client received response status = 405
146862025-03-07T23:12:32.019ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/utilization
146872025-03-07T23:12:32.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146882025-03-07T23:12:32.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a59702c2-5574-4d34-bc60-8e1965ec8771 uri = /v1/system/ip-pools/default/utilization
146892025-03-07T23:12:32.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a59702c2-5574-4d34-bc60-8e1965ec8771 response_code = 405 uri = /v1/system/ip-pools/default/utilization
146902025-03-07T23:12:32.019ZINFOtest_unauthorized (external client test context): client received response status = 405
146912025-03-07T23:12:32.019ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/utilization
146922025-03-07T23:12:32.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146932025-03-07T23:12:32.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ffd4de0f-d746-46c2-b82b-0c7e1f5a1c8c uri = /v1/system/ip-pools/default/utilization
146942025-03-07T23:12:32.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 460 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ffd4de0f-d746-46c2-b82b-0c7e1f5a1c8c response_code = 405 uri = /v1/system/ip-pools/default/utilization
146952025-03-07T23:12:32.020ZINFOtest_unauthorized (external client test context): client received response status = 405
146962025-03-07T23:12:32.020ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/utilization
146972025-03-07T23:12:32.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
146982025-03-07T23:12:32.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 115fe0ae-56ec-4405-bdf9-000ef87cdaa0 uri = /v1/system/ip-pools/default/utilization
146992025-03-07T23:12:32.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 115fe0ae-56ec-4405-bdf9-000ef87cdaa0 response_code = 405 uri = /v1/system/ip-pools/default/utilization
147002025-03-07T23:12:32.020ZINFOtest_unauthorized (external client test context): client received response status = 405
147012025-03-07T23:12:32.020ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/utilization
147022025-03-07T23:12:32.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
147032025-03-07T23:12:32.021ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 72503758-f650-4c0a-b731-1448b7c1b192 uri = /v1/system/ip-pools/default/utilization
147042025-03-07T23:12:32.021ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 72503758-f650-4c0a-b731-1448b7c1b192 response_code = 405 uri = /v1/system/ip-pools/default/utilization
147052025-03-07T23:12:32.021ZINFOtest_unauthorized (external client test context): client received response status = 405
147062025-03-07T23:12:32.021ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/utilization
147072025-03-07T23:12:32.021ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
147082025-03-07T23:12:32.021ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4042d2b5-632a-4304-a5a6-a4d8e23d97f0 uri = /v1/system/ip-pools/default/utilization
147092025-03-07T23:12:32.021ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4042d2b5-632a-4304-a5a6-a4d8e23d97f0 response_code = 405 uri = /v1/system/ip-pools/default/utilization
147102025-03-07T23:12:32.021ZINFOtest_unauthorized (external client test context): client received response status = 405
147112025-03-07T23:12:32.021ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/utilization
147122025-03-07T23:12:32.021ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
147132025-03-07T23:12:32.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b38810ec-ca15-468a-8669-9642e1b9620c uri = /v1/system/ip-pools/default/utilization
147142025-03-07T23:12:32.022ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b38810ec-ca15-468a-8669-9642e1b9620c response_code = 405 uri = /v1/system/ip-pools/default/utilization
147152025-03-07T23:12:32.022ZINFOtest_unauthorized (external client test context): client received response status = 405
147162025-03-07T23:12:32.022ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/utilization
147172025-03-07T23:12:32.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
147182025-03-07T23:12:32.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4e5c5d79-89f9-4e9c-bfc6-5ba28a4ce029 uri = /v1/system/ip-pools/default/utilization
147192025-03-07T23:12:32.023ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4e5c5d79-89f9-4e9c-bfc6-5ba28a4ce029 response_code = 405 uri = /v1/system/ip-pools/default/utilization
147202025-03-07T23:12:32.023ZINFOtest_unauthorized (external client test context): client received response status = 405
147212025-03-07T23:12:32.023ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/utilization
147222025-03-07T23:12:32.023ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools/default/utilization
147232025-03-07T23:12:32.023ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 uri = /v1/system/ip-pools/default/utilization
147242025-03-07T23:12:32.023ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 uri = /v1/system/ip-pools/default/utilization
147252025-03-07T23:12:32.023ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/utilization
147262025-03-07T23:12:32.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147272025-03-07T23:12:32.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147282025-03-07T23:12:32.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147292025-03-07T23:12:32.024ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147302025-03-07T23:12:32.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147312025-03-07T23:12:32.025ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147322025-03-07T23:12:32.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
147332025-03-07T23:12:32.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
147342025-03-07T23:12:32.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147352025-03-07T23:12:32.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147362025-03-07T23:12:32.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147372025-03-07T23:12:32.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
147382025-03-07T23:12:32.034ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147392025-03-07T23:12:32.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147402025-03-07T23:12:32.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147412025-03-07T23:12:32.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
147422025-03-07T23:12:32.037ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
147432025-03-07T23:12:32.037ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147442025-03-07T23:12:32.038ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147452025-03-07T23:12:32.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147462025-03-07T23:12:32.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
147472025-03-07T23:12:32.040ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
147482025-03-07T23:12:32.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147492025-03-07T23:12:32.041ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147502025-03-07T23:12:32.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147512025-03-07T23:12:32.046ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
147522025-03-07T23:12:32.048ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147532025-03-07T23:12:32.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147542025-03-07T23:12:32.050ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147552025-03-07T23:12:32.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
147562025-03-07T23:12:32.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
147572025-03-07T23:12:32.053ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 uri = /v1/system/ip-pools/default/utilization
147582025-03-07T23:12:32.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147592025-03-07T23:12:32.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147602025-03-07T23:12:32.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147612025-03-07T23:12:32.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147622025-03-07T23:12:32.057ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147632025-03-07T23:12:32.057ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147642025-03-07T23:12:32.057ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147652025-03-07T23:12:32.058ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147662025-03-07T23:12:32.059ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147672025-03-07T23:12:32.066ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147682025-03-07T23:12:32.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147692025-03-07T23:12:32.066ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147702025-03-07T23:12:32.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147712025-03-07T23:12:32.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147722025-03-07T23:12:32.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147732025-03-07T23:12:32.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147742025-03-07T23:12:32.077ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147752025-03-07T23:12:32.079ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147762025-03-07T23:12:32.079ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147772025-03-07T23:12:32.079ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147782025-03-07T23:12:32.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147792025-03-07T23:12:32.081ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147802025-03-07T23:12:32.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147812025-03-07T23:12:32.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147822025-03-07T23:12:32.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147832025-03-07T23:12:32.087ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147842025-03-07T23:12:32.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147852025-03-07T23:12:32.093ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147862025-03-07T23:12:32.093ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147872025-03-07T23:12:32.095ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147882025-03-07T23:12:32.095ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147892025-03-07T23:12:32.095ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147902025-03-07T23:12:32.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147912025-03-07T23:12:32.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = IpPool { parent: Fleet, key: 62016451-f62c-4aaf-b816-4ec2f9a8d1be, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147922025-03-07T23:12:32.105ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database uri = /v1/system/ip-pools/default/utilization
147932025-03-07T23:12:32.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147942025-03-07T23:12:32.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147952025-03-07T23:12:32.107ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 86626 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a2d9fa8-b882-459b-a14c-df359c507e33 response_code = 200 uri = /v1/system/ip-pools/default/utilization
147962025-03-07T23:12:32.107ZINFOtest_unauthorized (external client test context): client received response status = 200
147972025-03-07T23:12:32.108ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service
147982025-03-07T23:12:32.109ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools-service
147992025-03-07T23:12:32.109ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
148002025-03-07T23:12:32.109ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a uri = /v1/system/ip-pools-service
148012025-03-07T23:12:32.109ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a uri = /v1/system/ip-pools-service
148022025-03-07T23:12:32.109ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service
148032025-03-07T23:12:32.109ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148042025-03-07T23:12:32.109ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148052025-03-07T23:12:32.109ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148062025-03-07T23:12:32.111ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148072025-03-07T23:12:32.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148082025-03-07T23:12:32.111ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148092025-03-07T23:12:32.114ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
148102025-03-07T23:12:32.115ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
148112025-03-07T23:12:32.115ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148122025-03-07T23:12:32.115ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148132025-03-07T23:12:32.115ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148142025-03-07T23:12:32.116ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
148152025-03-07T23:12:32.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148162025-03-07T23:12:32.117ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148172025-03-07T23:12:32.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148182025-03-07T23:12:32.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
148192025-03-07T23:12:32.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
148202025-03-07T23:12:32.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148212025-03-07T23:12:32.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148222025-03-07T23:12:32.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148232025-03-07T23:12:32.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
148242025-03-07T23:12:32.138ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
148252025-03-07T23:12:32.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148262025-03-07T23:12:32.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148272025-03-07T23:12:32.139ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148282025-03-07T23:12:32.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
148292025-03-07T23:12:32.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148302025-03-07T23:12:32.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148312025-03-07T23:12:32.142ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148322025-03-07T23:12:32.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
148332025-03-07T23:12:32.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
148342025-03-07T23:12:32.147ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a uri = /v1/system/ip-pools-service
148352025-03-07T23:12:32.147ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database uri = /v1/system/ip-pools-service
148362025-03-07T23:12:32.148ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
148372025-03-07T23:12:32.148ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
148382025-03-07T23:12:32.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
148392025-03-07T23:12:32.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
148402025-03-07T23:12:32.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database uri = /v1/system/ip-pools-service
148412025-03-07T23:12:32.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
148422025-03-07T23:12:32.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
148432025-03-07T23:12:32.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
148442025-03-07T23:12:32.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
148452025-03-07T23:12:32.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
148462025-03-07T23:12:32.161ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
148472025-03-07T23:12:32.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database uri = /v1/system/ip-pools-service
148482025-03-07T23:12:32.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
148492025-03-07T23:12:32.162ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
148502025-03-07T23:12:32.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
148512025-03-07T23:12:32.171ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
148522025-03-07T23:12:32.172ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 62908 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 42d79f87-be87-4822-b706-fe1f69865f2a response_code = 200 uri = /v1/system/ip-pools-service
148532025-03-07T23:12:32.172ZINFOtest_unauthorized (external client test context): client received response status = 200
148542025-03-07T23:12:32.172ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service
148552025-03-07T23:12:32.172ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
148562025-03-07T23:12:32.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b uri = /v1/system/ip-pools-service
148572025-03-07T23:12:32.172ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b uri = /v1/system/ip-pools-service
148582025-03-07T23:12:32.172ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service
148592025-03-07T23:12:32.172ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148602025-03-07T23:12:32.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148612025-03-07T23:12:32.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148622025-03-07T23:12:32.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148632025-03-07T23:12:32.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148642025-03-07T23:12:32.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148652025-03-07T23:12:32.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
148662025-03-07T23:12:32.178ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
148672025-03-07T23:12:32.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148682025-03-07T23:12:32.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148692025-03-07T23:12:32.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148702025-03-07T23:12:32.183ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
148712025-03-07T23:12:32.183ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148722025-03-07T23:12:32.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148732025-03-07T23:12:32.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148742025-03-07T23:12:32.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
148752025-03-07T23:12:32.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
148762025-03-07T23:12:32.188ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148772025-03-07T23:12:32.188ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148782025-03-07T23:12:32.189ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148792025-03-07T23:12:32.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
148802025-03-07T23:12:32.193ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
148812025-03-07T23:12:32.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148822025-03-07T23:12:32.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148832025-03-07T23:12:32.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148842025-03-07T23:12:32.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
148852025-03-07T23:12:32.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
148862025-03-07T23:12:32.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
148872025-03-07T23:12:32.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
148882025-03-07T23:12:32.199ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
148892025-03-07T23:12:32.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
148902025-03-07T23:12:32.203ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b uri = /v1/system/ip-pools-service
148912025-03-07T23:12:32.203ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = Database uri = /v1/system/ip-pools-service
148922025-03-07T23:12:32.203ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
148932025-03-07T23:12:32.203ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
148942025-03-07T23:12:32.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
148952025-03-07T23:12:32.207ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
148962025-03-07T23:12:32.207ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = Database uri = /v1/system/ip-pools-service
148972025-03-07T23:12:32.207ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
148982025-03-07T23:12:32.208ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
148992025-03-07T23:12:32.210ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
149002025-03-07T23:12:32.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service
149012025-03-07T23:12:32.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 45367 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 33d270b5-3f1b-4041-b6ca-3487cf02485b response_code = 404 uri = /v1/system/ip-pools-service
149022025-03-07T23:12:32.219ZINFOtest_unauthorized (external client test context): client received response status = 404
149032025-03-07T23:12:32.219ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service
149042025-03-07T23:12:32.219ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149052025-03-07T23:12:32.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
149062025-03-07T23:12:32.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
149072025-03-07T23:12:32.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
149082025-03-07T23:12:32.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
149092025-03-07T23:12:32.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 uri = /v1/system/ip-pools-service
149102025-03-07T23:12:32.220ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 uri = /v1/system/ip-pools-service
149112025-03-07T23:12:32.220ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 uri = /v1/system/ip-pools-service
149122025-03-07T23:12:32.220ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 uri = /v1/system/ip-pools-service
149132025-03-07T23:12:32.220ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 resource = Database uri = /v1/system/ip-pools-service
149142025-03-07T23:12:32.222ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
149152025-03-07T23:12:32.222ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service
149162025-03-07T23:12:32.222ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 827 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6602f89b-fc04-4d92-98da-6d4ee33b5417 response_code = 401 uri = /v1/system/ip-pools-service
149172025-03-07T23:12:32.222ZINFOtest_unauthorized (external client test context): client received response status = 401
149182025-03-07T23:12:32.222ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service
149192025-03-07T23:12:32.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149202025-03-07T23:12:32.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52acacf-8370-4eca-b850-980b8c1d1d6a uri = /v1/system/ip-pools-service
149212025-03-07T23:12:32.223ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52acacf-8370-4eca-b850-980b8c1d1d6a uri = /v1/system/ip-pools-service
149222025-03-07T23:12:32.223ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52acacf-8370-4eca-b850-980b8c1d1d6a uri = /v1/system/ip-pools-service
149232025-03-07T23:12:32.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 183 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52acacf-8370-4eca-b850-980b8c1d1d6a response_code = 401 uri = /v1/system/ip-pools-service
149242025-03-07T23:12:32.223ZINFOtest_unauthorized (external client test context): client received response status = 401
149252025-03-07T23:12:32.224ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service
149262025-03-07T23:12:32.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149272025-03-07T23:12:32.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8c1e698-0659-4cb5-824e-784735c1426c uri = /v1/system/ip-pools-service
149282025-03-07T23:12:32.224ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8c1e698-0659-4cb5-824e-784735c1426c uri = /v1/system/ip-pools-service
149292025-03-07T23:12:32.226ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1352:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1360:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8c1e698-0659-4cb5-824e-784735c1426c uri = /v1/system/ip-pools-service
149302025-03-07T23:12:32.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 783 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8c1e698-0659-4cb5-824e-784735c1426c response_code = 401 uri = /v1/system/ip-pools-service
149312025-03-07T23:12:32.226ZINFOtest_unauthorized (external client test context): client received response status = 401
149322025-03-07T23:12:32.226ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service
149332025-03-07T23:12:32.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149342025-03-07T23:12:32.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c58a5127-7f87-4d50-8281-3e9b6493d320 uri = /v1/system/ip-pools-service
149352025-03-07T23:12:32.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c58a5127-7f87-4d50-8281-3e9b6493d320 response_code = 405 uri = /v1/system/ip-pools-service
149362025-03-07T23:12:32.226ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
149372025-03-07T23:12:32.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
149382025-03-07T23:12:32.226ZINFOtest_unauthorized (external client test context): client received response status = 405
149392025-03-07T23:12:32.227ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service
149402025-03-07T23:12:32.227ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149412025-03-07T23:12:32.228ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d270f432-ac1d-4678-b406-2e21c3146b44 uri = /v1/system/ip-pools-service
149422025-03-07T23:12:32.228ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d270f432-ac1d-4678-b406-2e21c3146b44 response_code = 405 uri = /v1/system/ip-pools-service
149432025-03-07T23:12:32.228ZINFOtest_unauthorized (external client test context): client received response status = 405
149442025-03-07T23:12:32.228ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service
149452025-03-07T23:12:32.228ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149462025-03-07T23:12:32.229ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8aa87ced-a05c-4c52-b48a-23efb49e7b5f uri = /v1/system/ip-pools-service
149472025-03-07T23:12:32.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8aa87ced-a05c-4c52-b48a-23efb49e7b5f response_code = 405 uri = /v1/system/ip-pools-service
149482025-03-07T23:12:32.230ZINFOtest_unauthorized (external client test context): client received response status = 405
149492025-03-07T23:12:32.230ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service
149502025-03-07T23:12:32.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149512025-03-07T23:12:32.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d2e808bb-2dc1-4eb0-aa91-883bf2bdbf13 uri = /v1/system/ip-pools-service
149522025-03-07T23:12:32.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d2e808bb-2dc1-4eb0-aa91-883bf2bdbf13 response_code = 405 uri = /v1/system/ip-pools-service
149532025-03-07T23:12:32.230ZINFOtest_unauthorized (external client test context): client received response status = 405
149542025-03-07T23:12:32.230ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service
149552025-03-07T23:12:32.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149562025-03-07T23:12:32.231ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 47467678-12ac-4c69-a74f-16071a18c948 uri = /v1/system/ip-pools-service
149572025-03-07T23:12:32.231ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 47467678-12ac-4c69-a74f-16071a18c948 response_code = 405 uri = /v1/system/ip-pools-service
149582025-03-07T23:12:32.231ZINFOtest_unauthorized (external client test context): client received response status = 405
149592025-03-07T23:12:32.231ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service
149602025-03-07T23:12:32.231ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149612025-03-07T23:12:32.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1cd62f50-1f5e-45d9-a018-cad93feb81a1 uri = /v1/system/ip-pools-service
149622025-03-07T23:12:32.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1cd62f50-1f5e-45d9-a018-cad93feb81a1 response_code = 405 uri = /v1/system/ip-pools-service
149632025-03-07T23:12:32.232ZINFOtest_unauthorized (external client test context): client received response status = 405
149642025-03-07T23:12:32.232ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service
149652025-03-07T23:12:32.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149662025-03-07T23:12:32.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d68da231-d577-4a6f-bbef-ce5383c2b34c uri = /v1/system/ip-pools-service
149672025-03-07T23:12:32.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d68da231-d577-4a6f-bbef-ce5383c2b34c response_code = 405 uri = /v1/system/ip-pools-service
149682025-03-07T23:12:32.232ZINFOtest_unauthorized (external client test context): client received response status = 405
149692025-03-07T23:12:32.233ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service
149702025-03-07T23:12:32.233ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149712025-03-07T23:12:32.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = df108627-4e6e-4982-8df3-f7032ddb955a uri = /v1/system/ip-pools-service
149722025-03-07T23:12:32.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = df108627-4e6e-4982-8df3-f7032ddb955a response_code = 405 uri = /v1/system/ip-pools-service
149732025-03-07T23:12:32.233ZINFOtest_unauthorized (external client test context): client received response status = 405
149742025-03-07T23:12:32.233ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service
149752025-03-07T23:12:32.233ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149762025-03-07T23:12:32.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1694aaaa-cbc1-4bd4-a9ef-9b55f7d1bf77 uri = /v1/system/ip-pools-service
149772025-03-07T23:12:32.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1694aaaa-cbc1-4bd4-a9ef-9b55f7d1bf77 response_code = 405 uri = /v1/system/ip-pools-service
149782025-03-07T23:12:32.233ZINFOtest_unauthorized (external client test context): client received response status = 405
149792025-03-07T23:12:32.234ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service
149802025-03-07T23:12:32.234ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149812025-03-07T23:12:32.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a9e10e0b-0ca7-4cbb-ac7e-19f333546626 uri = /v1/system/ip-pools-service
149822025-03-07T23:12:32.234ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a9e10e0b-0ca7-4cbb-ac7e-19f333546626 response_code = 405 uri = /v1/system/ip-pools-service
149832025-03-07T23:12:32.234ZINFOtest_unauthorized (external client test context): client received response status = 405
149842025-03-07T23:12:32.234ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service
149852025-03-07T23:12:32.235ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149862025-03-07T23:12:32.235ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a5afeaf-6314-4fc4-920e-c4cec0f62b72 uri = /v1/system/ip-pools-service
149872025-03-07T23:12:32.235ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a5afeaf-6314-4fc4-920e-c4cec0f62b72 response_code = 405 uri = /v1/system/ip-pools-service
149882025-03-07T23:12:32.235ZINFOtest_unauthorized (external client test context): client received response status = 405
149892025-03-07T23:12:32.235ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service
149902025-03-07T23:12:32.235ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149912025-03-07T23:12:32.235ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
149922025-03-07T23:12:32.237ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
149932025-03-07T23:12:32.238ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 95bf9698-e59e-465b-bfca-c636e131963b uri = /v1/system/ip-pools-service
149942025-03-07T23:12:32.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 95bf9698-e59e-465b-bfca-c636e131963b response_code = 405 uri = /v1/system/ip-pools-service
149952025-03-07T23:12:32.238ZINFOtest_unauthorized (external client test context): client received response status = 405
149962025-03-07T23:12:32.238ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service
149972025-03-07T23:12:32.238ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
149982025-03-07T23:12:32.238ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 254c99ca-7c9d-4993-9a8f-c72825e44eab uri = /v1/system/ip-pools-service
149992025-03-07T23:12:32.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 254c99ca-7c9d-4993-9a8f-c72825e44eab response_code = 405 uri = /v1/system/ip-pools-service
150002025-03-07T23:12:32.238ZINFOtest_unauthorized (external client test context): client received response status = 405
150012025-03-07T23:12:32.239ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service
150022025-03-07T23:12:32.239ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
150032025-03-07T23:12:32.239ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8311de3a-fc07-4e10-91a3-5aa1382c83b1 uri = /v1/system/ip-pools-service
150042025-03-07T23:12:32.239ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8311de3a-fc07-4e10-91a3-5aa1382c83b1 response_code = 405 uri = /v1/system/ip-pools-service
150052025-03-07T23:12:32.239ZINFOtest_unauthorized (external client test context): client received response status = 405
150062025-03-07T23:12:32.239ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service
150072025-03-07T23:12:32.241ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
150082025-03-07T23:12:32.241ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d6ba842c-074f-4eeb-a96d-2aa1acea9602 uri = /v1/system/ip-pools-service
150092025-03-07T23:12:32.241ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d6ba842c-074f-4eeb-a96d-2aa1acea9602 response_code = 405 uri = /v1/system/ip-pools-service
150102025-03-07T23:12:32.241ZINFOtest_unauthorized (external client test context): client received response status = 405
150112025-03-07T23:12:32.241ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service
150122025-03-07T23:12:32.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service
150132025-03-07T23:12:32.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a8aa43df-01a4-4568-8008-a09b9fa5ef0b uri = /v1/system/ip-pools-service
150142025-03-07T23:12:32.242ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a8aa43df-01a4-4568-8008-a09b9fa5ef0b response_code = 405 uri = /v1/system/ip-pools-service
150152025-03-07T23:12:32.242ZINFOtest_unauthorized (external client test context): client received response status = 405
150162025-03-07T23:12:32.242ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service
150172025-03-07T23:12:32.244ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service
150182025-03-07T23:12:32.244ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 uri = /v1/system/ip-pools-service
150192025-03-07T23:12:32.245ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 uri = /v1/system/ip-pools-service
150202025-03-07T23:12:32.245ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service
150212025-03-07T23:12:32.245ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150222025-03-07T23:12:32.245ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150232025-03-07T23:12:32.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150242025-03-07T23:12:32.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150252025-03-07T23:12:32.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150262025-03-07T23:12:32.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150272025-03-07T23:12:32.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
150282025-03-07T23:12:32.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150292025-03-07T23:12:32.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150302025-03-07T23:12:32.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150312025-03-07T23:12:32.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150322025-03-07T23:12:32.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150332025-03-07T23:12:32.247ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150342025-03-07T23:12:32.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150352025-03-07T23:12:32.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150362025-03-07T23:12:32.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150372025-03-07T23:12:32.249ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
150382025-03-07T23:12:32.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150392025-03-07T23:12:32.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150402025-03-07T23:12:32.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150412025-03-07T23:12:32.251ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
150422025-03-07T23:12:32.252ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150432025-03-07T23:12:32.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150442025-03-07T23:12:32.252ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150452025-03-07T23:12:32.252ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150462025-03-07T23:12:32.254ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150472025-03-07T23:12:32.254ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150482025-03-07T23:12:32.255ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150492025-03-07T23:12:32.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150502025-03-07T23:12:32.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150512025-03-07T23:12:32.261ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
150522025-03-07T23:12:32.266ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 uri = /v1/system/ip-pools-service
150532025-03-07T23:12:32.275ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database uri = /v1/system/ip-pools-service
150542025-03-07T23:12:32.275ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150552025-03-07T23:12:32.275ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150562025-03-07T23:12:32.275ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
150572025-03-07T23:12:32.275ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
150582025-03-07T23:12:32.276ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database uri = /v1/system/ip-pools-service
150592025-03-07T23:12:32.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150602025-03-07T23:12:32.276ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150612025-03-07T23:12:32.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
150622025-03-07T23:12:32.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
150632025-03-07T23:12:32.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
150642025-03-07T23:12:32.281ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
150652025-03-07T23:12:32.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database uri = /v1/system/ip-pools-service
150662025-03-07T23:12:32.281ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150672025-03-07T23:12:32.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150682025-03-07T23:12:32.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
150692025-03-07T23:12:32.293ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
150702025-03-07T23:12:32.293ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 59142 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4baa55d6-4f2b-48ed-a3c5-6950c23b6195 response_code = 200 uri = /v1/system/ip-pools-service
150712025-03-07T23:12:32.294ZINFOtest_unauthorized (external client test context): client received response status = 200
150722025-03-07T23:12:32.294ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges
150732025-03-07T23:12:32.294ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools-service/ranges
150742025-03-07T23:12:32.294ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
150752025-03-07T23:12:32.295ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea uri = /v1/system/ip-pools-service/ranges
150762025-03-07T23:12:32.296ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea uri = /v1/system/ip-pools-service/ranges
150772025-03-07T23:12:32.296ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service/ranges
150782025-03-07T23:12:32.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150792025-03-07T23:12:32.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150802025-03-07T23:12:32.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150812025-03-07T23:12:32.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150822025-03-07T23:12:32.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150832025-03-07T23:12:32.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150842025-03-07T23:12:32.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
150852025-03-07T23:12:32.301ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150862025-03-07T23:12:32.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150872025-03-07T23:12:32.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150882025-03-07T23:12:32.303ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150892025-03-07T23:12:32.304ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150902025-03-07T23:12:32.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150912025-03-07T23:12:32.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150922025-03-07T23:12:32.305ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150932025-03-07T23:12:32.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150942025-03-07T23:12:32.310ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
150952025-03-07T23:12:32.310ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150962025-03-07T23:12:32.310ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150972025-03-07T23:12:32.310ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150982025-03-07T23:12:32.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
150992025-03-07T23:12:32.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
151002025-03-07T23:12:32.313ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151012025-03-07T23:12:32.313ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151022025-03-07T23:12:32.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151032025-03-07T23:12:32.315ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
151042025-03-07T23:12:32.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151052025-03-07T23:12:32.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151062025-03-07T23:12:32.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151072025-03-07T23:12:32.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
151082025-03-07T23:12:32.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
151092025-03-07T23:12:32.321ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea uri = /v1/system/ip-pools-service/ranges
151102025-03-07T23:12:32.321ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database uri = /v1/system/ip-pools-service/ranges
151112025-03-07T23:12:32.321ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151122025-03-07T23:12:32.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151132025-03-07T23:12:32.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
151142025-03-07T23:12:32.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
151152025-03-07T23:12:32.323ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
151162025-03-07T23:12:32.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database uri = /v1/system/ip-pools-service/ranges
151172025-03-07T23:12:32.324ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151182025-03-07T23:12:32.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151192025-03-07T23:12:32.328ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
151202025-03-07T23:12:32.336ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151212025-03-07T23:12:32.337ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
151222025-03-07T23:12:32.337ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
151232025-03-07T23:12:32.337ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database uri = /v1/system/ip-pools-service/ranges
151242025-03-07T23:12:32.337ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151252025-03-07T23:12:32.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151262025-03-07T23:12:32.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
151272025-03-07T23:12:32.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151282025-03-07T23:12:32.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
151292025-03-07T23:12:32.346ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
151302025-03-07T23:12:32.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database uri = /v1/system/ip-pools-service/ranges
151312025-03-07T23:12:32.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151322025-03-07T23:12:32.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151332025-03-07T23:12:32.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
151342025-03-07T23:12:32.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151352025-03-07T23:12:32.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database uri = /v1/system/ip-pools-service/ranges
151362025-03-07T23:12:32.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151372025-03-07T23:12:32.360ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151382025-03-07T23:12:32.362ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 67397 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3cce414-64d6-4559-b6a4-0c772eb6ddea response_code = 200 uri = /v1/system/ip-pools-service/ranges
151392025-03-07T23:12:32.364ZINFOtest_unauthorized (external client test context): client received response status = 200
151402025-03-07T23:12:32.366ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges
151412025-03-07T23:12:32.366ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
151422025-03-07T23:12:32.367ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 uri = /v1/system/ip-pools-service/ranges
151432025-03-07T23:12:32.368ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 uri = /v1/system/ip-pools-service/ranges
151442025-03-07T23:12:32.368ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges
151452025-03-07T23:12:32.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151462025-03-07T23:12:32.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151472025-03-07T23:12:32.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151482025-03-07T23:12:32.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151492025-03-07T23:12:32.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151502025-03-07T23:12:32.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151512025-03-07T23:12:32.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
151522025-03-07T23:12:32.372ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
151532025-03-07T23:12:32.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151542025-03-07T23:12:32.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151552025-03-07T23:12:32.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151562025-03-07T23:12:32.372ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
151572025-03-07T23:12:32.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151582025-03-07T23:12:32.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151592025-03-07T23:12:32.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151602025-03-07T23:12:32.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
151612025-03-07T23:12:32.382ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
151622025-03-07T23:12:32.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151632025-03-07T23:12:32.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151642025-03-07T23:12:32.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151652025-03-07T23:12:32.385ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
151662025-03-07T23:12:32.386ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
151672025-03-07T23:12:32.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151682025-03-07T23:12:32.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151692025-03-07T23:12:32.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151702025-03-07T23:12:32.389ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
151712025-03-07T23:12:32.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
151722025-03-07T23:12:32.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
151732025-03-07T23:12:32.390ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
151742025-03-07T23:12:32.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
151752025-03-07T23:12:32.395ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
151762025-03-07T23:12:32.395ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 uri = /v1/system/ip-pools-service/ranges
151772025-03-07T23:12:32.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = Database uri = /v1/system/ip-pools-service/ranges
151782025-03-07T23:12:32.395ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151792025-03-07T23:12:32.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151802025-03-07T23:12:32.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
151812025-03-07T23:12:32.400ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
151822025-03-07T23:12:32.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = Database uri = /v1/system/ip-pools-service/ranges
151832025-03-07T23:12:32.401ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151842025-03-07T23:12:32.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
151852025-03-07T23:12:32.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151862025-03-07T23:12:32.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges
151872025-03-07T23:12:32.408ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 45631 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 965e29b0-e67c-4231-949b-b2c638fd6912 response_code = 404 uri = /v1/system/ip-pools-service/ranges
151882025-03-07T23:12:32.409ZINFOtest_unauthorized (external client test context): client received response status = 404
151892025-03-07T23:12:32.410ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges
151902025-03-07T23:12:32.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
151912025-03-07T23:12:32.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 uri = /v1/system/ip-pools-service/ranges
151922025-03-07T23:12:32.410ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 uri = /v1/system/ip-pools-service/ranges
151932025-03-07T23:12:32.410ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 uri = /v1/system/ip-pools-service/ranges
151942025-03-07T23:12:32.410ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 uri = /v1/system/ip-pools-service/ranges
151952025-03-07T23:12:32.410ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 resource = Database uri = /v1/system/ip-pools-service/ranges
151962025-03-07T23:12:32.410ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
151972025-03-07T23:12:32.411ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges
151982025-03-07T23:12:32.411ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 723 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 64c9c1d9-a8df-4637-a254-15f3734503e2 response_code = 401 uri = /v1/system/ip-pools-service/ranges
151992025-03-07T23:12:32.411ZINFOtest_unauthorized (external client test context): client received response status = 401
152002025-03-07T23:12:32.411ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges
152012025-03-07T23:12:32.411ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152022025-03-07T23:12:32.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 296ddec9-a7a8-4a4c-850e-12ba0b07e4df uri = /v1/system/ip-pools-service/ranges
152032025-03-07T23:12:32.411ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 296ddec9-a7a8-4a4c-850e-12ba0b07e4df uri = /v1/system/ip-pools-service/ranges
152042025-03-07T23:12:32.411ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 296ddec9-a7a8-4a4c-850e-12ba0b07e4df uri = /v1/system/ip-pools-service/ranges
152052025-03-07T23:12:32.411ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 149 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 296ddec9-a7a8-4a4c-850e-12ba0b07e4df response_code = 401 uri = /v1/system/ip-pools-service/ranges
152062025-03-07T23:12:32.411ZINFOtest_unauthorized (external client test context): client received response status = 401
152072025-03-07T23:12:32.411ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges
152082025-03-07T23:12:32.411ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152092025-03-07T23:12:32.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6df5d40-3881-419c-8e96-2590b85887c2 uri = /v1/system/ip-pools-service/ranges
152102025-03-07T23:12:32.411ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6df5d40-3881-419c-8e96-2590b85887c2 uri = /v1/system/ip-pools-service/ranges
152112025-03-07T23:12:32.412ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1460:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1490:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6df5d40-3881-419c-8e96-2590b85887c2 uri = /v1/system/ip-pools-service/ranges
152122025-03-07T23:12:32.413ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 937 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6df5d40-3881-419c-8e96-2590b85887c2 response_code = 401 uri = /v1/system/ip-pools-service/ranges
152132025-03-07T23:12:32.413ZINFOtest_unauthorized (external client test context): client received response status = 401
152142025-03-07T23:12:32.413ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges
152152025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152162025-03-07T23:12:32.414ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = db941a97-7d23-4cdf-a323-6abd9656fbee uri = /v1/system/ip-pools-service/ranges
152172025-03-07T23:12:32.414ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = db941a97-7d23-4cdf-a323-6abd9656fbee response_code = 405 uri = /v1/system/ip-pools-service/ranges
152182025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client received response status = 405
152192025-03-07T23:12:32.414ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges
152202025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152212025-03-07T23:12:32.414ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52a28d56-cdf3-43a5-95ce-40497973cb62 uri = /v1/system/ip-pools-service/ranges
152222025-03-07T23:12:32.414ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52a28d56-cdf3-43a5-95ce-40497973cb62 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152232025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client received response status = 405
152242025-03-07T23:12:32.414ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges
152252025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152262025-03-07T23:12:32.414ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = feca21f5-5fb9-4ab5-b9da-564800e041d4 uri = /v1/system/ip-pools-service/ranges
152272025-03-07T23:12:32.414ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = feca21f5-5fb9-4ab5-b9da-564800e041d4 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152282025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client received response status = 405
152292025-03-07T23:12:32.414ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges
152302025-03-07T23:12:32.414ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152312025-03-07T23:12:32.414ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7ac618-1a3e-4c07-a8ab-d7fa7c2e6969 uri = /v1/system/ip-pools-service/ranges
152322025-03-07T23:12:32.415ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7ac618-1a3e-4c07-a8ab-d7fa7c2e6969 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152332025-03-07T23:12:32.415ZINFOtest_unauthorized (external client test context): client received response status = 405
152342025-03-07T23:12:32.415ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges
152352025-03-07T23:12:32.415ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152362025-03-07T23:12:32.415ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fc3d61b8-c508-41cf-8bfc-d09326844188 uri = /v1/system/ip-pools-service/ranges
152372025-03-07T23:12:32.417ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fc3d61b8-c508-41cf-8bfc-d09326844188 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152382025-03-07T23:12:32.417ZINFOtest_unauthorized (external client test context): client received response status = 405
152392025-03-07T23:12:32.417ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges
152402025-03-07T23:12:32.417ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152412025-03-07T23:12:32.417ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da10fdf0-0607-404f-9d25-542eeb1e58da uri = /v1/system/ip-pools-service/ranges
152422025-03-07T23:12:32.417ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da10fdf0-0607-404f-9d25-542eeb1e58da response_code = 405 uri = /v1/system/ip-pools-service/ranges
152432025-03-07T23:12:32.417ZINFOtest_unauthorized (external client test context): client received response status = 405
152442025-03-07T23:12:32.417ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges
152452025-03-07T23:12:32.417ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152462025-03-07T23:12:32.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d0113028-ad20-48f3-94cb-d918bf4f9041 uri = /v1/system/ip-pools-service/ranges
152472025-03-07T23:12:32.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d0113028-ad20-48f3-94cb-d918bf4f9041 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152482025-03-07T23:12:32.418ZINFOtest_unauthorized (external client test context): client received response status = 405
152492025-03-07T23:12:32.418ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges
152502025-03-07T23:12:32.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152512025-03-07T23:12:32.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4117f18b-1039-41e8-8b02-17210df4a8dd uri = /v1/system/ip-pools-service/ranges
152522025-03-07T23:12:32.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4117f18b-1039-41e8-8b02-17210df4a8dd response_code = 405 uri = /v1/system/ip-pools-service/ranges
152532025-03-07T23:12:32.418ZINFOtest_unauthorized (external client test context): client received response status = 405
152542025-03-07T23:12:32.418ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges
152552025-03-07T23:12:32.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152562025-03-07T23:12:32.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c86094f2-d621-422a-96c6-ce4a21970a3e uri = /v1/system/ip-pools-service/ranges
152572025-03-07T23:12:32.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c86094f2-d621-422a-96c6-ce4a21970a3e response_code = 405 uri = /v1/system/ip-pools-service/ranges
152582025-03-07T23:12:32.420ZINFOtest_unauthorized (external client test context): client received response status = 405
152592025-03-07T23:12:32.420ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges
152602025-03-07T23:12:32.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152612025-03-07T23:12:32.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e3ad9302-ade1-4035-b7c3-d82b67772ef3 uri = /v1/system/ip-pools-service/ranges
152622025-03-07T23:12:32.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e3ad9302-ade1-4035-b7c3-d82b67772ef3 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152632025-03-07T23:12:32.421ZINFOtest_unauthorized (external client test context): client received response status = 405
152642025-03-07T23:12:32.421ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges
152652025-03-07T23:12:32.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152662025-03-07T23:12:32.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cc746668-0d9a-4c85-b943-364635670103 uri = /v1/system/ip-pools-service/ranges
152672025-03-07T23:12:32.422ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cc746668-0d9a-4c85-b943-364635670103 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152682025-03-07T23:12:32.422ZINFOtest_unauthorized (external client test context): client received response status = 405
152692025-03-07T23:12:32.422ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges
152702025-03-07T23:12:32.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152712025-03-07T23:12:32.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 34c06f62-16cb-4b75-a771-c179ec2e3e26 uri = /v1/system/ip-pools-service/ranges
152722025-03-07T23:12:32.425ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 34c06f62-16cb-4b75-a771-c179ec2e3e26 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152732025-03-07T23:12:32.427ZINFOtest_unauthorized (external client test context): client received response status = 405
152742025-03-07T23:12:32.427ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges
152752025-03-07T23:12:32.427ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152762025-03-07T23:12:32.427ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = aaa9457a-71e6-498d-98f2-0182fffb92df uri = /v1/system/ip-pools-service/ranges
152772025-03-07T23:12:32.431ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = aaa9457a-71e6-498d-98f2-0182fffb92df response_code = 405 uri = /v1/system/ip-pools-service/ranges
152782025-03-07T23:12:32.435ZINFOtest_unauthorized (external client test context): client received response status = 405
152792025-03-07T23:12:32.435ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges
152802025-03-07T23:12:32.435ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152812025-03-07T23:12:32.435ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0da6a1e8-fc5b-41d4-a05d-a4dbf82cbd9e uri = /v1/system/ip-pools-service/ranges
152822025-03-07T23:12:32.435ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0da6a1e8-fc5b-41d4-a05d-a4dbf82cbd9e response_code = 405 uri = /v1/system/ip-pools-service/ranges
152832025-03-07T23:12:32.435ZINFOtest_unauthorized (external client test context): client received response status = 405
152842025-03-07T23:12:32.435ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges
152852025-03-07T23:12:32.435ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152862025-03-07T23:12:32.435ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe0adebd-9963-464b-895d-9083ffe8b96e uri = /v1/system/ip-pools-service/ranges
152872025-03-07T23:12:32.435ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe0adebd-9963-464b-895d-9083ffe8b96e response_code = 405 uri = /v1/system/ip-pools-service/ranges
152882025-03-07T23:12:32.435ZINFOtest_unauthorized (external client test context): client received response status = 405
152892025-03-07T23:12:32.440ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges
152902025-03-07T23:12:32.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152912025-03-07T23:12:32.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b8e9e255-5d5d-4610-b51d-33b3458f2fd0 uri = /v1/system/ip-pools-service/ranges
152922025-03-07T23:12:32.441ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b8e9e255-5d5d-4610-b51d-33b3458f2fd0 response_code = 405 uri = /v1/system/ip-pools-service/ranges
152932025-03-07T23:12:32.441ZINFOtest_unauthorized (external client test context): client received response status = 405
152942025-03-07T23:12:32.441ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges
152952025-03-07T23:12:32.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges
152962025-03-07T23:12:32.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 uri = /v1/system/ip-pools-service/ranges
152972025-03-07T23:12:32.441ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 uri = /v1/system/ip-pools-service/ranges
152982025-03-07T23:12:32.442ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service/ranges
152992025-03-07T23:12:32.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153002025-03-07T23:12:32.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153012025-03-07T23:12:32.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153022025-03-07T23:12:32.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153032025-03-07T23:12:32.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153042025-03-07T23:12:32.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153052025-03-07T23:12:32.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
153062025-03-07T23:12:32.443ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
153072025-03-07T23:12:32.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153082025-03-07T23:12:32.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153092025-03-07T23:12:32.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153102025-03-07T23:12:32.443ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
153112025-03-07T23:12:32.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153122025-03-07T23:12:32.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153132025-03-07T23:12:32.447ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153142025-03-07T23:12:32.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
153152025-03-07T23:12:32.458ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
153162025-03-07T23:12:32.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153172025-03-07T23:12:32.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153182025-03-07T23:12:32.458ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153192025-03-07T23:12:32.461ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
153202025-03-07T23:12:32.462ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
153212025-03-07T23:12:32.462ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153222025-03-07T23:12:32.462ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153232025-03-07T23:12:32.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153242025-03-07T23:12:32.463ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
153252025-03-07T23:12:32.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153262025-03-07T23:12:32.465ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153272025-03-07T23:12:32.467ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153282025-03-07T23:12:32.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
153292025-03-07T23:12:32.469ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
153302025-03-07T23:12:32.470ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 uri = /v1/system/ip-pools-service/ranges
153312025-03-07T23:12:32.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database uri = /v1/system/ip-pools-service/ranges
153322025-03-07T23:12:32.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153332025-03-07T23:12:32.470ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153342025-03-07T23:12:32.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153352025-03-07T23:12:32.471ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153362025-03-07T23:12:32.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database uri = /v1/system/ip-pools-service/ranges
153372025-03-07T23:12:32.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153382025-03-07T23:12:32.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153392025-03-07T23:12:32.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153402025-03-07T23:12:32.480ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153412025-03-07T23:12:32.480ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153422025-03-07T23:12:32.480ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153432025-03-07T23:12:32.480ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database uri = /v1/system/ip-pools-service/ranges
153442025-03-07T23:12:32.481ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153452025-03-07T23:12:32.481ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153462025-03-07T23:12:32.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153472025-03-07T23:12:32.489ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153482025-03-07T23:12:32.489ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153492025-03-07T23:12:32.489ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153502025-03-07T23:12:32.491ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database uri = /v1/system/ip-pools-service/ranges
153512025-03-07T23:12:32.491ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153522025-03-07T23:12:32.491ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153532025-03-07T23:12:32.492ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 0ff9cae1-d775-45d4-807e-9a91034bb82d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
153542025-03-07T23:12:32.493ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 207 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54056 req_id = 0ff9cae1-d775-45d4-807e-9a91034bb82d response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
153552025-03-07T23:12:32.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153562025-03-07T23:12:32.500ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153572025-03-07T23:12:32.500ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database uri = /v1/system/ip-pools-service/ranges
153582025-03-07T23:12:32.500ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153592025-03-07T23:12:32.501ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153602025-03-07T23:12:32.505ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 83567 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b8f1330-5907-4d5e-a98e-88daaac8aac4 response_code = 200 uri = /v1/system/ip-pools-service/ranges
153612025-03-07T23:12:32.505ZINFOtest_unauthorized (external client test context): client received response status = 200
153622025-03-07T23:12:32.505ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges/add
153632025-03-07T23:12:32.505ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools-service/ranges/add
153642025-03-07T23:12:32.505ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges/add
153652025-03-07T23:12:32.505ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153662025-03-07T23:12:32.505ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d4f6f86-2e02-4138-ad0e-fc3eac10ad0b uri = /v1/system/ip-pools-service/ranges/add
153672025-03-07T23:12:32.506ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 80 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d4f6f86-2e02-4138-ad0e-fc3eac10ad0b response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153682025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client received response status = 405
153692025-03-07T23:12:32.507ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges/add
153702025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153712025-03-07T23:12:32.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ce183d4f-0a3d-4090-bdc7-110fc39be05a uri = /v1/system/ip-pools-service/ranges/add
153722025-03-07T23:12:32.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ce183d4f-0a3d-4090-bdc7-110fc39be05a response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153732025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client received response status = 405
153742025-03-07T23:12:32.507ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges/add
153752025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153762025-03-07T23:12:32.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c08c8e0e-9ac3-42bc-98f0-80f1bad1a5db uri = /v1/system/ip-pools-service/ranges/add
153772025-03-07T23:12:32.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c08c8e0e-9ac3-42bc-98f0-80f1bad1a5db response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153782025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client received response status = 405
153792025-03-07T23:12:32.507ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges/add
153802025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153812025-03-07T23:12:32.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ade53b47-f111-41eb-bd81-8cdb6373f5aa uri = /v1/system/ip-pools-service/ranges/add
153822025-03-07T23:12:32.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ade53b47-f111-41eb-bd81-8cdb6373f5aa response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153832025-03-07T23:12:32.507ZINFOtest_unauthorized (external client test context): client received response status = 405
153842025-03-07T23:12:32.507ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges/add
153852025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153862025-03-07T23:12:32.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f789b8d9-047d-404e-b4cb-6415cd71678e uri = /v1/system/ip-pools-service/ranges/add
153872025-03-07T23:12:32.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f789b8d9-047d-404e-b4cb-6415cd71678e response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153882025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client received response status = 405
153892025-03-07T23:12:32.509ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges/add
153902025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153912025-03-07T23:12:32.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7c21f381-d828-4378-9eb4-48a063d9c6bb uri = /v1/system/ip-pools-service/ranges/add
153922025-03-07T23:12:32.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7c21f381-d828-4378-9eb4-48a063d9c6bb response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153932025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client received response status = 405
153942025-03-07T23:12:32.509ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges/add
153952025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
153962025-03-07T23:12:32.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5e52bd9d-ccdc-4b18-9ae4-e126ba089c67 uri = /v1/system/ip-pools-service/ranges/add
153972025-03-07T23:12:32.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5e52bd9d-ccdc-4b18-9ae4-e126ba089c67 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
153982025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client received response status = 405
153992025-03-07T23:12:32.509ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges/add
154002025-03-07T23:12:32.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154012025-03-07T23:12:32.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 55c9f34b-3397-4518-bd40-214b43108cc1 uri = /v1/system/ip-pools-service/ranges/add
154022025-03-07T23:12:32.511ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 55c9f34b-3397-4518-bd40-214b43108cc1 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
154032025-03-07T23:12:32.511ZINFOtest_unauthorized (external client test context): client received response status = 405
154042025-03-07T23:12:32.511ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges/add
154052025-03-07T23:12:32.511ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154062025-03-07T23:12:32.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 uri = /v1/system/ip-pools-service/ranges/add
154072025-03-07T23:12:32.511ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 uri = /v1/system/ip-pools-service/ranges/add
154082025-03-07T23:12:32.511ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges/add
154092025-03-07T23:12:32.511ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154102025-03-07T23:12:32.511ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154112025-03-07T23:12:32.511ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154122025-03-07T23:12:32.513ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154132025-03-07T23:12:32.513ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154142025-03-07T23:12:32.513ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154152025-03-07T23:12:32.516ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
154162025-03-07T23:12:32.516ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
154172025-03-07T23:12:32.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154182025-03-07T23:12:32.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154192025-03-07T23:12:32.517ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154202025-03-07T23:12:32.518ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
154212025-03-07T23:12:32.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154222025-03-07T23:12:32.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154232025-03-07T23:12:32.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154242025-03-07T23:12:32.522ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
154252025-03-07T23:12:32.524ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
154262025-03-07T23:12:32.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154272025-03-07T23:12:32.524ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154282025-03-07T23:12:32.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154292025-03-07T23:12:32.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
154302025-03-07T23:12:32.527ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
154312025-03-07T23:12:32.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154322025-03-07T23:12:32.527ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154332025-03-07T23:12:32.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154342025-03-07T23:12:32.530ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
154352025-03-07T23:12:32.531ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154362025-03-07T23:12:32.531ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154372025-03-07T23:12:32.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154382025-03-07T23:12:32.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
154392025-03-07T23:12:32.535ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
154402025-03-07T23:12:32.536ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 uri = /v1/system/ip-pools-service/ranges/add
154412025-03-07T23:12:32.536ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = Database uri = /v1/system/ip-pools-service/ranges/add
154422025-03-07T23:12:32.536ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
154432025-03-07T23:12:32.536ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/add
154442025-03-07T23:12:32.539ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges/add
154452025-03-07T23:12:32.539ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges/add
154462025-03-07T23:12:32.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = Database uri = /v1/system/ip-pools-service/ranges/add
154472025-03-07T23:12:32.540ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
154482025-03-07T23:12:32.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/add
154492025-03-07T23:12:32.544ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
154502025-03-07T23:12:32.551ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges/add
154512025-03-07T23:12:32.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 41382 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e4f200b-d474-4bb1-b7dd-0e4093c488a7 response_code = 404 uri = /v1/system/ip-pools-service/ranges/add
154522025-03-07T23:12:32.552ZINFOtest_unauthorized (external client test context): client received response status = 404
154532025-03-07T23:12:32.552ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges/add
154542025-03-07T23:12:32.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154552025-03-07T23:12:32.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b uri = /v1/system/ip-pools-service/ranges/add
154562025-03-07T23:12:32.553ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b uri = /v1/system/ip-pools-service/ranges/add
154572025-03-07T23:12:32.553ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b uri = /v1/system/ip-pools-service/ranges/add
154582025-03-07T23:12:32.554ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b uri = /v1/system/ip-pools-service/ranges/add
154592025-03-07T23:12:32.554ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b resource = Database uri = /v1/system/ip-pools-service/ranges/add
154602025-03-07T23:12:32.556ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
154612025-03-07T23:12:32.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges/add
154622025-03-07T23:12:32.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1516 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2258f40a-7dcd-408c-ac37-d9457238c49b response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
154632025-03-07T23:12:32.565ZINFOtest_unauthorized (external client test context): client received response status = 401
154642025-03-07T23:12:32.566ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges/add
154652025-03-07T23:12:32.566ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154662025-03-07T23:12:32.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d11c1f14-bce9-4d6e-90ac-7c3af01bf1e3 uri = /v1/system/ip-pools-service/ranges/add
154672025-03-07T23:12:32.566ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d11c1f14-bce9-4d6e-90ac-7c3af01bf1e3 uri = /v1/system/ip-pools-service/ranges/add
154682025-03-07T23:12:32.566ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d11c1f14-bce9-4d6e-90ac-7c3af01bf1e3 uri = /v1/system/ip-pools-service/ranges/add
154692025-03-07T23:12:32.566ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 243 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d11c1f14-bce9-4d6e-90ac-7c3af01bf1e3 response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
154702025-03-07T23:12:32.566ZINFOtest_unauthorized (external client test context): client received response status = 401
154712025-03-07T23:12:32.566ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges/add
154722025-03-07T23:12:32.566ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154732025-03-07T23:12:32.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4efbb31e-4237-4b92-8fb7-0833f8053c50 uri = /v1/system/ip-pools-service/ranges/add
154742025-03-07T23:12:32.566ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4efbb31e-4237-4b92-8fb7-0833f8053c50 uri = /v1/system/ip-pools-service/ranges/add
154752025-03-07T23:12:32.567ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1500:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1510:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4efbb31e-4237-4b92-8fb7-0833f8053c50 uri = /v1/system/ip-pools-service/ranges/add
154762025-03-07T23:12:32.567ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 943 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4efbb31e-4237-4b92-8fb7-0833f8053c50 response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
154772025-03-07T23:12:32.567ZINFOtest_unauthorized (external client test context): client received response status = 401
154782025-03-07T23:12:32.567ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges/add
154792025-03-07T23:12:32.567ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154802025-03-07T23:12:32.567ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7a8ad38c-a737-4f70-b8ec-6db1fcaf8dde uri = /v1/system/ip-pools-service/ranges/add
154812025-03-07T23:12:32.567ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7a8ad38c-a737-4f70-b8ec-6db1fcaf8dde response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
154822025-03-07T23:12:32.567ZINFOtest_unauthorized (external client test context): client received response status = 405
154832025-03-07T23:12:32.567ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges/add
154842025-03-07T23:12:32.568ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154852025-03-07T23:12:32.569ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b08c9198-fd30-4d37-ad33-354c0e829f27 uri = /v1/system/ip-pools-service/ranges/add
154862025-03-07T23:12:32.569ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b08c9198-fd30-4d37-ad33-354c0e829f27 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
154872025-03-07T23:12:32.569ZINFOtest_unauthorized (external client test context): client received response status = 405
154882025-03-07T23:12:32.569ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges/add
154892025-03-07T23:12:32.569ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154902025-03-07T23:12:32.570ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a558da1-9061-4a05-a281-a29c637bffdf uri = /v1/system/ip-pools-service/ranges/add
154912025-03-07T23:12:32.570ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a558da1-9061-4a05-a281-a29c637bffdf response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
154922025-03-07T23:12:32.570ZINFOtest_unauthorized (external client test context): client received response status = 405
154932025-03-07T23:12:32.571ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges/add
154942025-03-07T23:12:32.571ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
154952025-03-07T23:12:32.571ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 093c7351-8e59-4aa5-b90b-4c8b8623aacb uri = /v1/system/ip-pools-service/ranges/add
154962025-03-07T23:12:32.571ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 093c7351-8e59-4aa5-b90b-4c8b8623aacb response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
154972025-03-07T23:12:32.571ZINFOtest_unauthorized (external client test context): client received response status = 405
154982025-03-07T23:12:32.571ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges/add
154992025-03-07T23:12:32.571ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
155002025-03-07T23:12:32.571ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1ede7cc9-f945-4a56-83d7-ee0089e216e7 uri = /v1/system/ip-pools-service/ranges/add
155012025-03-07T23:12:32.571ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1ede7cc9-f945-4a56-83d7-ee0089e216e7 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155022025-03-07T23:12:32.572ZINFOtest_unauthorized (external client test context): client received response status = 405
155032025-03-07T23:12:32.572ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges/add
155042025-03-07T23:12:32.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
155052025-03-07T23:12:32.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0f5606b6-5666-4c83-8dac-e3ff6b8f978e uri = /v1/system/ip-pools-service/ranges/add
155062025-03-07T23:12:32.573ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0f5606b6-5666-4c83-8dac-e3ff6b8f978e response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155072025-03-07T23:12:32.573ZINFOtest_unauthorized (external client test context): client received response status = 405
155082025-03-07T23:12:32.573ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges/add
155092025-03-07T23:12:32.573ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
155102025-03-07T23:12:32.573ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 83ee7944-78b9-4840-ac76-c7bbad82506c uri = /v1/system/ip-pools-service/ranges/add
155112025-03-07T23:12:32.573ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 83ee7944-78b9-4840-ac76-c7bbad82506c response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155122025-03-07T23:12:32.573ZINFOtest_unauthorized (external client test context): client received response status = 405
155132025-03-07T23:12:32.573ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges/add
155142025-03-07T23:12:32.573ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/add
155152025-03-07T23:12:32.573ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e71e605c-b0d4-4f25-9ee2-c3aa5f10c338 uri = /v1/system/ip-pools-service/ranges/add
155162025-03-07T23:12:32.573ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e71e605c-b0d4-4f25-9ee2-c3aa5f10c338 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155172025-03-07T23:12:32.573ZINFOtest_unauthorized (external client test context): client received response status = 405
155182025-03-07T23:12:32.574ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges/add
155192025-03-07T23:12:32.575ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges/remove
155202025-03-07T23:12:32.575ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools-service/ranges/remove
155212025-03-07T23:12:32.575ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges/remove
155222025-03-07T23:12:32.575ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155232025-03-07T23:12:32.575ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05c73bf6-e048-407d-a945-829721e050ab uri = /v1/system/ip-pools-service/ranges/remove
155242025-03-07T23:12:32.575ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05c73bf6-e048-407d-a945-829721e050ab response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155252025-03-07T23:12:32.575ZINFOtest_unauthorized (external client test context): client received response status = 405
155262025-03-07T23:12:32.575ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges/remove
155272025-03-07T23:12:32.575ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155282025-03-07T23:12:32.575ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3acbe760-4615-4905-ad84-155effa0d2e5 uri = /v1/system/ip-pools-service/ranges/remove
155292025-03-07T23:12:32.575ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3acbe760-4615-4905-ad84-155effa0d2e5 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155302025-03-07T23:12:32.578ZINFOtest_unauthorized (external client test context): client received response status = 405
155312025-03-07T23:12:32.578ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges/remove
155322025-03-07T23:12:32.578ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155332025-03-07T23:12:32.579ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 50537a5f-247d-4813-b75e-7a41b0d82729 uri = /v1/system/ip-pools-service/ranges/remove
155342025-03-07T23:12:32.579ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 50537a5f-247d-4813-b75e-7a41b0d82729 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155352025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client received response status = 405
155362025-03-07T23:12:32.580ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges/remove
155372025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155382025-03-07T23:12:32.580ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e50856c0-4ff8-4146-a56a-76788aa00027 uri = /v1/system/ip-pools-service/ranges/remove
155392025-03-07T23:12:32.580ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e50856c0-4ff8-4146-a56a-76788aa00027 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155402025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client received response status = 405
155412025-03-07T23:12:32.580ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges/remove
155422025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155432025-03-07T23:12:32.580ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 41ec6305-8698-4507-ba76-515c59babac1 uri = /v1/system/ip-pools-service/ranges/remove
155442025-03-07T23:12:32.580ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 41ec6305-8698-4507-ba76-515c59babac1 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155452025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client received response status = 405
155462025-03-07T23:12:32.580ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges/remove
155472025-03-07T23:12:32.580ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155482025-03-07T23:12:32.580ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cd9cd131-8b5f-4405-b4ea-27f151714d1c uri = /v1/system/ip-pools-service/ranges/remove
155492025-03-07T23:12:32.589ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cd9cd131-8b5f-4405-b4ea-27f151714d1c response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155502025-03-07T23:12:32.589ZINFOtest_unauthorized (external client test context): client received response status = 405
155512025-03-07T23:12:32.589ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges/remove
155522025-03-07T23:12:32.589ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155532025-03-07T23:12:32.589ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e18f9828-1e49-4af9-9ca5-0a25c0a31da0 uri = /v1/system/ip-pools-service/ranges/remove
155542025-03-07T23:12:32.589ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e18f9828-1e49-4af9-9ca5-0a25c0a31da0 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155552025-03-07T23:12:32.589ZINFOtest_unauthorized (external client test context): client received response status = 405
155562025-03-07T23:12:32.589ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges/remove
155572025-03-07T23:12:32.589ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155582025-03-07T23:12:32.589ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 470b6e91-7d4a-410b-a421-88e77f2e4bd4 uri = /v1/system/ip-pools-service/ranges/remove
155592025-03-07T23:12:32.589ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 470b6e91-7d4a-410b-a421-88e77f2e4bd4 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
155602025-03-07T23:12:32.590ZINFOtest_unauthorized (external client test context): client received response status = 405
155612025-03-07T23:12:32.591ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges/remove
155622025-03-07T23:12:32.591ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
155632025-03-07T23:12:32.591ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 uri = /v1/system/ip-pools-service/ranges/remove
155642025-03-07T23:12:32.591ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 uri = /v1/system/ip-pools-service/ranges/remove
155652025-03-07T23:12:32.603ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges/remove
155662025-03-07T23:12:32.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155672025-03-07T23:12:32.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155682025-03-07T23:12:32.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155692025-03-07T23:12:32.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155702025-03-07T23:12:32.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155712025-03-07T23:12:32.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155722025-03-07T23:12:32.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
155732025-03-07T23:12:32.604ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
155742025-03-07T23:12:32.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155752025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155762025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155772025-03-07T23:12:32.604ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
155782025-03-07T23:12:32.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155792025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155802025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155812025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
155822025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
155832025-03-07T23:12:32.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155842025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155852025-03-07T23:12:32.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155862025-03-07T23:12:32.604ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155872025-03-07T23:12:32.604ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155882025-03-07T23:12:32.604ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155892025-03-07T23:12:32.604ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155902025-03-07T23:12:32.604ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155912025-03-07T23:12:32.605ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
155922025-03-07T23:12:32.605ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
155932025-03-07T23:12:32.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
155942025-03-07T23:12:32.606ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155952025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155962025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155972025-03-07T23:12:32.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
155982025-03-07T23:12:32.606ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155992025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156002025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156012025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
156022025-03-07T23:12:32.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
156032025-03-07T23:12:32.606ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 uri = /v1/system/ip-pools-service/ranges/remove
156042025-03-07T23:12:32.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = Database uri = /v1/system/ip-pools-service/ranges/remove
156052025-03-07T23:12:32.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
156062025-03-07T23:12:32.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/remove
156072025-03-07T23:12:32.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges/remove
156082025-03-07T23:12:32.607ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges/remove
156092025-03-07T23:12:32.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = Database uri = /v1/system/ip-pools-service/ranges/remove
156102025-03-07T23:12:32.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
156112025-03-07T23:12:32.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/remove
156122025-03-07T23:12:32.609ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
156132025-03-07T23:12:32.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 resource = IpPool { parent: Fleet, key: 023a7da0-e406-4310-b1cb-8538b9f39afa, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges/remove
156142025-03-07T23:12:32.619ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 52185 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7c3e9d9e-6d88-4f17-b21b-7f6d3efbc7e2 response_code = 404 uri = /v1/system/ip-pools-service/ranges/remove
156152025-03-07T23:12:32.622ZINFOtest_unauthorized (external client test context): client received response status = 404
156162025-03-07T23:12:32.622ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges/remove
156172025-03-07T23:12:32.622ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156182025-03-07T23:12:32.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb uri = /v1/system/ip-pools-service/ranges/remove
156192025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb uri = /v1/system/ip-pools-service/ranges/remove
156202025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb uri = /v1/system/ip-pools-service/ranges/remove
156212025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb uri = /v1/system/ip-pools-service/ranges/remove
156222025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb resource = Database uri = /v1/system/ip-pools-service/ranges/remove
156232025-03-07T23:12:32.623ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
156242025-03-07T23:12:32.623ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges/remove
156252025-03-07T23:12:32.623ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 808 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fc7ddd9-b6db-4de1-8767-798362704efb response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
156262025-03-07T23:12:32.623ZINFOtest_unauthorized (external client test context): client received response status = 401
156272025-03-07T23:12:32.623ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges/remove
156282025-03-07T23:12:32.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156292025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44e79672-6aaa-4e75-8de8-3b8a6c4125d2 uri = /v1/system/ip-pools-service/ranges/remove
156302025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44e79672-6aaa-4e75-8de8-3b8a6c4125d2 uri = /v1/system/ip-pools-service/ranges/remove
156312025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44e79672-6aaa-4e75-8de8-3b8a6c4125d2 uri = /v1/system/ip-pools-service/ranges/remove
156322025-03-07T23:12:32.623ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 196 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44e79672-6aaa-4e75-8de8-3b8a6c4125d2 response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
156332025-03-07T23:12:32.623ZINFOtest_unauthorized (external client test context): client received response status = 401
156342025-03-07T23:12:32.623ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges/remove
156352025-03-07T23:12:32.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156362025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cd458ac2-3103-466d-a936-ed472da640a8 uri = /v1/system/ip-pools-service/ranges/remove
156372025-03-07T23:12:32.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cd458ac2-3103-466d-a936-ed472da640a8 uri = /v1/system/ip-pools-service/ranges/remove
156382025-03-07T23:12:32.629ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1522:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1530:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cd458ac2-3103-466d-a936-ed472da640a8 uri = /v1/system/ip-pools-service/ranges/remove
156392025-03-07T23:12:32.629ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2525 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cd458ac2-3103-466d-a936-ed472da640a8 response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
156402025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client received response status = 401
156412025-03-07T23:12:32.629ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges/remove
156422025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156432025-03-07T23:12:32.629ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f5768579-909a-447e-b1c1-bb3774faec3a uri = /v1/system/ip-pools-service/ranges/remove
156442025-03-07T23:12:32.629ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f5768579-909a-447e-b1c1-bb3774faec3a response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156452025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client received response status = 405
156462025-03-07T23:12:32.629ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges/remove
156472025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156482025-03-07T23:12:32.629ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = aa0947af-8aa5-44fd-9653-7dbd5d8ec14b uri = /v1/system/ip-pools-service/ranges/remove
156492025-03-07T23:12:32.629ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = aa0947af-8aa5-44fd-9653-7dbd5d8ec14b response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156502025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client received response status = 405
156512025-03-07T23:12:32.629ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges/remove
156522025-03-07T23:12:32.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156532025-03-07T23:12:32.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 558f8e1c-7103-4510-b903-6455007a0fda uri = /v1/system/ip-pools-service/ranges/remove
156542025-03-07T23:12:32.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 558f8e1c-7103-4510-b903-6455007a0fda response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156552025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client received response status = 405
156562025-03-07T23:12:32.630ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges/remove
156572025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156582025-03-07T23:12:32.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b5cb2b7a-cc0f-4579-94ac-320be9c488c1 uri = /v1/system/ip-pools-service/ranges/remove
156592025-03-07T23:12:32.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b5cb2b7a-cc0f-4579-94ac-320be9c488c1 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156602025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client received response status = 405
156612025-03-07T23:12:32.630ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges/remove
156622025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156632025-03-07T23:12:32.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 012312fa-1cb2-4c83-b90d-d8a0aa886467 uri = /v1/system/ip-pools-service/ranges/remove
156642025-03-07T23:12:32.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 012312fa-1cb2-4c83-b90d-d8a0aa886467 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156652025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client received response status = 405
156662025-03-07T23:12:32.630ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges/remove
156672025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156682025-03-07T23:12:32.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 65cc9683-5db7-45d9-820e-bae9f7598d07 uri = /v1/system/ip-pools-service/ranges/remove
156692025-03-07T23:12:32.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 65cc9683-5db7-45d9-820e-bae9f7598d07 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156702025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client received response status = 405
156712025-03-07T23:12:32.630ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges/remove
156722025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156732025-03-07T23:12:32.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a5d5d32-555a-4971-9c02-f9f1c43affdd uri = /v1/system/ip-pools-service/ranges/remove
156742025-03-07T23:12:32.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a5d5d32-555a-4971-9c02-f9f1c43affdd response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156752025-03-07T23:12:32.630ZINFOtest_unauthorized (external client test context): client received response status = 405
156762025-03-07T23:12:32.630ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges/remove
156772025-03-07T23:12:32.631ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/ip-pools-service/ranges/remove
156782025-03-07T23:12:32.631ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d3ea8469-cf6b-4e83-bf91-3c029adde806 uri = /v1/system/ip-pools-service/ranges/remove
156792025-03-07T23:12:32.631ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d3ea8469-cf6b-4e83-bf91-3c029adde806 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
156802025-03-07T23:12:32.631ZINFOtest_unauthorized (external client test context): client received response status = 405
156812025-03-07T23:12:32.631ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges/remove
156822025-03-07T23:12:32.631ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos
156832025-03-07T23:12:32.631ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos
156842025-03-07T23:12:32.631ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
156852025-03-07T23:12:32.631ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc uri = /v1/system/silos
156862025-03-07T23:12:32.631ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc uri = /v1/system/silos
156872025-03-07T23:12:32.632ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
156882025-03-07T23:12:32.632ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156892025-03-07T23:12:32.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156902025-03-07T23:12:32.633ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156912025-03-07T23:12:32.635ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156922025-03-07T23:12:32.635ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156932025-03-07T23:12:32.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156942025-03-07T23:12:32.638ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
156952025-03-07T23:12:32.638ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
156962025-03-07T23:12:32.638ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156972025-03-07T23:12:32.638ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156982025-03-07T23:12:32.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156992025-03-07T23:12:32.643ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157002025-03-07T23:12:32.645ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157012025-03-07T23:12:32.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157022025-03-07T23:12:32.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157032025-03-07T23:12:32.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157042025-03-07T23:12:32.654ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
157052025-03-07T23:12:32.654ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157062025-03-07T23:12:32.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157072025-03-07T23:12:32.655ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157082025-03-07T23:12:32.661ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
157092025-03-07T23:12:32.661ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
157102025-03-07T23:12:32.661ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157112025-03-07T23:12:32.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157122025-03-07T23:12:32.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157132025-03-07T23:12:32.665ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157142025-03-07T23:12:32.665ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157152025-03-07T23:12:32.665ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157162025-03-07T23:12:32.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157172025-03-07T23:12:32.668ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157182025-03-07T23:12:32.672ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
157192025-03-07T23:12:32.672ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc uri = /v1/system/silos
157202025-03-07T23:12:32.673ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Fleet uri = /v1/system/silos
157212025-03-07T23:12:32.673ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
157222025-03-07T23:12:32.673ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Database uri = /v1/system/silos
157232025-03-07T23:12:32.673ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc roles = RoleSet { roles: {} } uri = /v1/system/silos
157242025-03-07T23:12:32.673ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Database result = Ok(()) uri = /v1/system/silos
157252025-03-07T23:12:32.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
157262025-03-07T23:12:32.681ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Fleet result = Ok(()) uri = /v1/system/silos
157272025-03-07T23:12:32.681ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Database uri = /v1/system/silos
157282025-03-07T23:12:32.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc roles = RoleSet { roles: {} } uri = /v1/system/silos
157292025-03-07T23:12:32.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc resource = Database result = Ok(()) uri = /v1/system/silos
157302025-03-07T23:12:32.696ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 64765 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a5f7610a-f5f0-42d8-89b1-f572e927a6bc response_code = 200 uri = /v1/system/silos
157312025-03-07T23:12:32.697ZINFOtest_unauthorized (external client test context): client received response status = 200
157322025-03-07T23:12:32.698ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos
157332025-03-07T23:12:32.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
157342025-03-07T23:12:32.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b uri = /v1/system/silos
157352025-03-07T23:12:32.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b uri = /v1/system/silos
157362025-03-07T23:12:32.698ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos
157372025-03-07T23:12:32.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157382025-03-07T23:12:32.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157392025-03-07T23:12:32.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157402025-03-07T23:12:32.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157412025-03-07T23:12:32.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157422025-03-07T23:12:32.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157432025-03-07T23:12:32.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
157442025-03-07T23:12:32.706ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
157452025-03-07T23:12:32.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157462025-03-07T23:12:32.706ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157472025-03-07T23:12:32.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157482025-03-07T23:12:32.711ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157492025-03-07T23:12:32.711ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157502025-03-07T23:12:32.711ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157512025-03-07T23:12:32.711ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157522025-03-07T23:12:32.712ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157532025-03-07T23:12:32.718ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
157542025-03-07T23:12:32.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157552025-03-07T23:12:32.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157562025-03-07T23:12:32.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157572025-03-07T23:12:32.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
157582025-03-07T23:12:32.722ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
157592025-03-07T23:12:32.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157602025-03-07T23:12:32.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157612025-03-07T23:12:32.722ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157622025-03-07T23:12:32.724ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157632025-03-07T23:12:32.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157642025-03-07T23:12:32.726ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157652025-03-07T23:12:32.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157662025-03-07T23:12:32.735ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157672025-03-07T23:12:32.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
157682025-03-07T23:12:32.739ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b uri = /v1/system/silos
157692025-03-07T23:12:32.739ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b resource = Fleet uri = /v1/system/silos
157702025-03-07T23:12:32.739ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
157712025-03-07T23:12:32.739ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b resource = Database uri = /v1/system/silos
157722025-03-07T23:12:32.740ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b roles = RoleSet { roles: {} } uri = /v1/system/silos
157732025-03-07T23:12:32.740ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b resource = Database result = Ok(()) uri = /v1/system/silos
157742025-03-07T23:12:32.752ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b roles = RoleSet { roles: {} } uri = /v1/system/silos
157752025-03-07T23:12:32.759ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b resource = Fleet result = Err(Forbidden) uri = /v1/system/silos
157762025-03-07T23:12:32.760ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 62542 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a50586c9-7315-4a94-aa41-0636a4433f2b response_code = 403 uri = /v1/system/silos
157772025-03-07T23:12:32.761ZINFOtest_unauthorized (external client test context): client received response status = 403
157782025-03-07T23:12:32.762ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos
157792025-03-07T23:12:32.762ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
157802025-03-07T23:12:32.763ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 uri = /v1/system/silos
157812025-03-07T23:12:32.764ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 uri = /v1/system/silos
157822025-03-07T23:12:32.764ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 uri = /v1/system/silos
157832025-03-07T23:12:32.764ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 uri = /v1/system/silos
157842025-03-07T23:12:32.764ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 resource = Fleet uri = /v1/system/silos
157852025-03-07T23:12:32.764ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 roles = RoleSet { roles: {} } uri = /v1/system/silos
157862025-03-07T23:12:32.765ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos
157872025-03-07T23:12:32.766ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2236 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fe2550e-aa81-48a9-bc63-0aad6c62c0d9 response_code = 401 uri = /v1/system/silos
157882025-03-07T23:12:32.766ZINFOtest_unauthorized (external client test context): client received response status = 401
157892025-03-07T23:12:32.767ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos
157902025-03-07T23:12:32.767ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
157912025-03-07T23:12:32.770ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2349a849-152e-483d-a398-e5c348fce233 uri = /v1/system/silos
157922025-03-07T23:12:32.771ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2349a849-152e-483d-a398-e5c348fce233 uri = /v1/system/silos
157932025-03-07T23:12:32.771ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2349a849-152e-483d-a398-e5c348fce233 uri = /v1/system/silos
157942025-03-07T23:12:32.771ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 627 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2349a849-152e-483d-a398-e5c348fce233 response_code = 401 uri = /v1/system/silos
157952025-03-07T23:12:32.775ZINFOtest_unauthorized (external client test context): client received response status = 401
157962025-03-07T23:12:32.775ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos
157972025-03-07T23:12:32.775ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
157982025-03-07T23:12:32.776ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb55558d-e699-428d-a073-f18917f71d2e uri = /v1/system/silos
157992025-03-07T23:12:32.777ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb55558d-e699-428d-a073-f18917f71d2e uri = /v1/system/silos
158002025-03-07T23:12:32.778ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:403:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:420:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb55558d-e699-428d-a073-f18917f71d2e uri = /v1/system/silos
158012025-03-07T23:12:32.779ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2300 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb55558d-e699-428d-a073-f18917f71d2e response_code = 401 uri = /v1/system/silos
158022025-03-07T23:12:32.779ZINFOtest_unauthorized (external client test context): client received response status = 401
158032025-03-07T23:12:32.780ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos
158042025-03-07T23:12:32.780ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos
158052025-03-07T23:12:32.781ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3c0ba5d-a3e3-4339-bad2-3bcdde145949 uri = /v1/system/silos
158062025-03-07T23:12:32.781ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3c0ba5d-a3e3-4339-bad2-3bcdde145949 response_code = 405 uri = /v1/system/silos
158072025-03-07T23:12:32.783ZINFOtest_unauthorized (external client test context): client received response status = 405
158082025-03-07T23:12:32.784ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos
158092025-03-07T23:12:32.784ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos
158102025-03-07T23:12:32.784ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8c32734-6e6a-4cae-bb77-692ba8937ebe uri = /v1/system/silos
158112025-03-07T23:12:32.785ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8c32734-6e6a-4cae-bb77-692ba8937ebe response_code = 405 uri = /v1/system/silos
158122025-03-07T23:12:32.786ZINFOtest_unauthorized (external client test context): client received response status = 405
158132025-03-07T23:12:32.787ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos
158142025-03-07T23:12:32.787ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos
158152025-03-07T23:12:32.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4188b93b-8e76-4a85-9c8f-57af7a39e9cf uri = /v1/system/silos
158162025-03-07T23:12:32.794ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 341 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4188b93b-8e76-4a85-9c8f-57af7a39e9cf response_code = 405 uri = /v1/system/silos
158172025-03-07T23:12:32.800ZINFOtest_unauthorized (external client test context): client received response status = 405
158182025-03-07T23:12:32.801ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos
158192025-03-07T23:12:32.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos
158202025-03-07T23:12:32.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 62bcc1ec-9c8a-4ba0-b824-a9ce4165ceb4 uri = /v1/system/silos
158212025-03-07T23:12:32.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 205 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 62bcc1ec-9c8a-4ba0-b824-a9ce4165ceb4 response_code = 405 uri = /v1/system/silos
158222025-03-07T23:12:32.802ZINFOtest_unauthorized (external client test context): client received response status = 405
158232025-03-07T23:12:32.803ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos
158242025-03-07T23:12:32.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos
158252025-03-07T23:12:32.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 uri = /v1/system/silos
158262025-03-07T23:12:32.804ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 uri = /v1/system/silos
158272025-03-07T23:12:32.804ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos
158282025-03-07T23:12:32.804ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158292025-03-07T23:12:32.805ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158302025-03-07T23:12:32.805ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158312025-03-07T23:12:32.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158322025-03-07T23:12:32.807ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158332025-03-07T23:12:32.808ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158342025-03-07T23:12:32.810ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
158352025-03-07T23:12:32.810ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
158362025-03-07T23:12:32.810ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158372025-03-07T23:12:32.811ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158382025-03-07T23:12:32.811ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158392025-03-07T23:12:32.813ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
158402025-03-07T23:12:32.813ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158412025-03-07T23:12:32.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158422025-03-07T23:12:32.813ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158432025-03-07T23:12:32.819ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
158442025-03-07T23:12:32.820ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
158452025-03-07T23:12:32.820ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158462025-03-07T23:12:32.820ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158472025-03-07T23:12:32.820ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158482025-03-07T23:12:32.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
158492025-03-07T23:12:32.826ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
158502025-03-07T23:12:32.826ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158512025-03-07T23:12:32.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158522025-03-07T23:12:32.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158532025-03-07T23:12:32.827ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
158542025-03-07T23:12:32.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158552025-03-07T23:12:32.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158562025-03-07T23:12:32.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158572025-03-07T23:12:32.830ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
158582025-03-07T23:12:32.834ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
158592025-03-07T23:12:32.834ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 uri = /v1/system/silos
158602025-03-07T23:12:32.834ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158612025-03-07T23:12:32.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158622025-03-07T23:12:32.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158632025-03-07T23:12:32.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
158642025-03-07T23:12:32.839ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
158652025-03-07T23:12:32.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158662025-03-07T23:12:32.839ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158672025-03-07T23:12:32.839ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158682025-03-07T23:12:32.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
158692025-03-07T23:12:32.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
158702025-03-07T23:12:32.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 resource = BlueprintConfig uri = /v1/system/silos
158712025-03-07T23:12:32.854ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
158722025-03-07T23:12:32.854ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 resource = Database uri = /v1/system/silos
158732025-03-07T23:12:32.854ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 roles = RoleSet { roles: {} } uri = /v1/system/silos
158742025-03-07T23:12:32.855ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 resource = Database result = Ok(()) uri = /v1/system/silos
158752025-03-07T23:12:32.858ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 roles = RoleSet { roles: {} } uri = /v1/system/silos
158762025-03-07T23:12:32.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 resource = BlueprintConfig result = Err(Forbidden) uri = /v1/system/silos
158772025-03-07T23:12:32.865ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 62056 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bc529d7a-b288-44ca-b4f6-3a16af2fa2e6 response_code = 403 uri = /v1/system/silos
158782025-03-07T23:12:32.865ZINFOtest_unauthorized (external client test context): client received response status = 403
158792025-03-07T23:12:32.866ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos
158802025-03-07T23:12:32.866ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos
158812025-03-07T23:12:32.866ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d uri = /v1/system/silos
158822025-03-07T23:12:32.866ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d uri = /v1/system/silos
158832025-03-07T23:12:32.867ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d uri = /v1/system/silos
158842025-03-07T23:12:32.867ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d uri = /v1/system/silos
158852025-03-07T23:12:32.867ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158862025-03-07T23:12:32.868ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158872025-03-07T23:12:32.868ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158882025-03-07T23:12:32.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
158892025-03-07T23:12:32.869ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
158902025-03-07T23:12:32.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158912025-03-07T23:12:32.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158922025-03-07T23:12:32.870ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158932025-03-07T23:12:32.871ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
158942025-03-07T23:12:32.877ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
158952025-03-07T23:12:32.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d resource = BlueprintConfig uri = /v1/system/silos
158962025-03-07T23:12:32.879ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d roles = RoleSet { roles: {} } uri = /v1/system/silos
158972025-03-07T23:12:32.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d resource = BlueprintConfig result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos
158982025-03-07T23:12:32.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading target blueprint: authorization failed for unauthenticated request latency_us = 13383 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ee4f5a16-f868-44e1-9b13-ac9f1429856d response_code = 401 uri = /v1/system/silos
158992025-03-07T23:12:32.880ZINFOtest_unauthorized (external client test context): client received response status = 401
159002025-03-07T23:12:32.881ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos
159012025-03-07T23:12:32.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos
159022025-03-07T23:12:32.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bb7a8414-91c5-44a4-a919-7beaf4e0578a uri = /v1/system/silos
159032025-03-07T23:12:32.881ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bb7a8414-91c5-44a4-a919-7beaf4e0578a uri = /v1/system/silos
159042025-03-07T23:12:32.881ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bb7a8414-91c5-44a4-a919-7beaf4e0578a uri = /v1/system/silos
159052025-03-07T23:12:32.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 325 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = bb7a8414-91c5-44a4-a919-7beaf4e0578a response_code = 401 uri = /v1/system/silos
159062025-03-07T23:12:32.881ZINFOtest_unauthorized (external client test context): client received response status = 401
159072025-03-07T23:12:32.881ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos
159082025-03-07T23:12:32.882ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos
159092025-03-07T23:12:32.882ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d2ec6e6-bc07-4687-ac76-f820244c467c uri = /v1/system/silos
159102025-03-07T23:12:32.882ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d2ec6e6-bc07-4687-ac76-f820244c467c uri = /v1/system/silos
159112025-03-07T23:12:32.883ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:430:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:440:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d2ec6e6-bc07-4687-ac76-f820244c467c uri = /v1/system/silos
159122025-03-07T23:12:32.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 916 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d2ec6e6-bc07-4687-ac76-f820244c467c response_code = 401 uri = /v1/system/silos
159132025-03-07T23:12:32.883ZINFOtest_unauthorized (external client test context): client received response status = 401
159142025-03-07T23:12:32.883ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos
159152025-03-07T23:12:32.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos
159162025-03-07T23:12:32.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 282f80bb-b268-4037-958f-6bea8aa56ed3 uri = /v1/system/silos
159172025-03-07T23:12:32.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 282f80bb-b268-4037-958f-6bea8aa56ed3 response_code = 405 uri = /v1/system/silos
159182025-03-07T23:12:32.883ZINFOtest_unauthorized (external client test context): client received response status = 405
159192025-03-07T23:12:32.883ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos
159202025-03-07T23:12:32.884ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos
159212025-03-07T23:12:32.884ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3b1594d4-8119-455d-9de9-4a7d9469d879 uri = /v1/system/silos
159222025-03-07T23:12:32.884ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3b1594d4-8119-455d-9de9-4a7d9469d879 response_code = 405 uri = /v1/system/silos
159232025-03-07T23:12:32.884ZINFOtest_unauthorized (external client test context): client received response status = 405
159242025-03-07T23:12:32.884ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos
159252025-03-07T23:12:32.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos
159262025-03-07T23:12:32.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 84775cbc-125c-489e-8e8c-4ea156f7bfd5 uri = /v1/system/silos
159272025-03-07T23:12:32.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 84775cbc-125c-489e-8e8c-4ea156f7bfd5 response_code = 405 uri = /v1/system/silos
159282025-03-07T23:12:32.885ZINFOtest_unauthorized (external client test context): client received response status = 405
159292025-03-07T23:12:32.885ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos
159302025-03-07T23:12:32.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos
159312025-03-07T23:12:32.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c68c56c-f9cc-4c58-8c94-db22b9bfffa7 uri = /v1/system/silos
159322025-03-07T23:12:32.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c68c56c-f9cc-4c58-8c94-db22b9bfffa7 response_code = 405 uri = /v1/system/silos
159332025-03-07T23:12:32.885ZINFOtest_unauthorized (external client test context): client received response status = 405
159342025-03-07T23:12:32.886ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos
159352025-03-07T23:12:32.886ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos
159362025-03-07T23:12:32.886ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd46b542-bb75-4f68-96a0-0568ca9d9c95 uri = /v1/system/silos
159372025-03-07T23:12:32.886ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 95 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd46b542-bb75-4f68-96a0-0568ca9d9c95 response_code = 405 uri = /v1/system/silos
159382025-03-07T23:12:32.887ZINFOtest_unauthorized (external client test context): client received response status = 405
159392025-03-07T23:12:32.887ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos
159402025-03-07T23:12:32.887ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos
159412025-03-07T23:12:32.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 885f9c1e-be8b-4bcc-b5f4-83bedf2e9c41 uri = /v1/system/silos
159422025-03-07T23:12:32.887ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 885f9c1e-be8b-4bcc-b5f4-83bedf2e9c41 response_code = 405 uri = /v1/system/silos
159432025-03-07T23:12:32.887ZINFOtest_unauthorized (external client test context): client received response status = 405
159442025-03-07T23:12:32.887ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos
159452025-03-07T23:12:32.887ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos
159462025-03-07T23:12:32.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 69d3b252-067d-45cb-a494-e96fff54150a uri = /v1/system/silos
159472025-03-07T23:12:32.887ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 69d3b252-067d-45cb-a494-e96fff54150a response_code = 405 uri = /v1/system/silos
159482025-03-07T23:12:32.887ZINFOtest_unauthorized (external client test context): client received response status = 405
159492025-03-07T23:12:32.888ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos
159502025-03-07T23:12:32.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos
159512025-03-07T23:12:32.888ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 53f6afa1-81de-4ccc-8bac-5ed53cb6e243 uri = /v1/system/silos
159522025-03-07T23:12:32.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 53f6afa1-81de-4ccc-8bac-5ed53cb6e243 response_code = 405 uri = /v1/system/silos
159532025-03-07T23:12:32.889ZINFOtest_unauthorized (external client test context): client received response status = 405
159542025-03-07T23:12:32.889ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos
159552025-03-07T23:12:32.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos
159562025-03-07T23:12:32.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb uri = /v1/system/silos
159572025-03-07T23:12:32.889ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb uri = /v1/system/silos
159582025-03-07T23:12:32.889ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
159592025-03-07T23:12:32.889ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159602025-03-07T23:12:32.889ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159612025-03-07T23:12:32.889ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159622025-03-07T23:12:32.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159632025-03-07T23:12:32.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159642025-03-07T23:12:32.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159652025-03-07T23:12:32.894ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
159662025-03-07T23:12:32.894ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
159672025-03-07T23:12:32.894ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159682025-03-07T23:12:32.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159692025-03-07T23:12:32.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159702025-03-07T23:12:32.896ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
159712025-03-07T23:12:32.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159722025-03-07T23:12:32.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159732025-03-07T23:12:32.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159742025-03-07T23:12:32.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
159752025-03-07T23:12:32.902ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
159762025-03-07T23:12:32.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159772025-03-07T23:12:32.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159782025-03-07T23:12:32.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159792025-03-07T23:12:32.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
159802025-03-07T23:12:32.905ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
159812025-03-07T23:12:32.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159822025-03-07T23:12:32.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159832025-03-07T23:12:32.906ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159842025-03-07T23:12:32.909ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
159852025-03-07T23:12:32.909ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159862025-03-07T23:12:32.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159872025-03-07T23:12:32.909ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159882025-03-07T23:12:32.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
159892025-03-07T23:12:32.915ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
159902025-03-07T23:12:32.922ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb uri = /v1/system/silos
159912025-03-07T23:12:32.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Fleet uri = /v1/system/silos
159922025-03-07T23:12:32.922ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
159932025-03-07T23:12:32.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Database uri = /v1/system/silos
159942025-03-07T23:12:32.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb roles = RoleSet { roles: {} } uri = /v1/system/silos
159952025-03-07T23:12:32.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Database result = Ok(()) uri = /v1/system/silos
159962025-03-07T23:12:32.927ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
159972025-03-07T23:12:32.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Fleet result = Ok(()) uri = /v1/system/silos
159982025-03-07T23:12:32.934ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Database uri = /v1/system/silos
159992025-03-07T23:12:32.934ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb roles = RoleSet { roles: {} } uri = /v1/system/silos
160002025-03-07T23:12:32.934ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb resource = Database result = Ok(()) uri = /v1/system/silos
160012025-03-07T23:12:32.938ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 49710 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7a54745-91ee-4ee5-8d61-bc45d58663fb response_code = 200 uri = /v1/system/silos
160022025-03-07T23:12:32.938ZINFOtest_unauthorized (external client test context): client received response status = 200
160032025-03-07T23:12:32.938ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo
160042025-03-07T23:12:32.938ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo
160052025-03-07T23:12:32.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
160062025-03-07T23:12:32.939ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 uri = /v1/system/silos/demo-silo
160072025-03-07T23:12:32.940ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 uri = /v1/system/silos/demo-silo
160082025-03-07T23:12:32.940ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo
160092025-03-07T23:12:32.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160102025-03-07T23:12:32.940ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160112025-03-07T23:12:32.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160122025-03-07T23:12:32.942ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160132025-03-07T23:12:32.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160142025-03-07T23:12:32.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160152025-03-07T23:12:32.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
160162025-03-07T23:12:32.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160172025-03-07T23:12:32.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160182025-03-07T23:12:32.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160192025-03-07T23:12:32.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160202025-03-07T23:12:32.947ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160212025-03-07T23:12:32.948ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160222025-03-07T23:12:32.948ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160232025-03-07T23:12:32.948ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160242025-03-07T23:12:32.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160252025-03-07T23:12:32.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
160262025-03-07T23:12:32.956ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160272025-03-07T23:12:32.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160282025-03-07T23:12:32.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160292025-03-07T23:12:32.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
160302025-03-07T23:12:32.961ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160312025-03-07T23:12:32.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160322025-03-07T23:12:32.961ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160332025-03-07T23:12:32.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160342025-03-07T23:12:32.964ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160352025-03-07T23:12:32.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160362025-03-07T23:12:32.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160372025-03-07T23:12:32.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160382025-03-07T23:12:32.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160392025-03-07T23:12:32.972ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
160402025-03-07T23:12:32.972ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 uri = /v1/system/silos/demo-silo
160412025-03-07T23:12:32.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database uri = /v1/system/silos/demo-silo
160422025-03-07T23:12:32.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
160432025-03-07T23:12:32.973ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
160442025-03-07T23:12:32.975ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
160452025-03-07T23:12:32.975ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo
160462025-03-07T23:12:32.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database uri = /v1/system/silos/demo-silo
160472025-03-07T23:12:32.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
160482025-03-07T23:12:32.976ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
160492025-03-07T23:12:32.980ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
160502025-03-07T23:12:32.981ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database uri = /v1/system/silos/demo-silo
160512025-03-07T23:12:32.981ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
160522025-03-07T23:12:32.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
160532025-03-07T23:12:32.984ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo
160542025-03-07T23:12:32.993ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo
160552025-03-07T23:12:32.993ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 54553 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 76c663c3-f461-402c-bff2-211c22001528 response_code = 200 uri = /v1/system/silos/demo-silo
160562025-03-07T23:12:32.994ZINFOtest_unauthorized (external client test context): client received response status = 200
160572025-03-07T23:12:32.994ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo
160582025-03-07T23:12:32.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
160592025-03-07T23:12:32.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d uri = /v1/system/silos/demo-silo
160602025-03-07T23:12:32.995ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d uri = /v1/system/silos/demo-silo
160612025-03-07T23:12:32.995ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo
160622025-03-07T23:12:32.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160632025-03-07T23:12:32.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160642025-03-07T23:12:32.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160652025-03-07T23:12:32.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160662025-03-07T23:12:32.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160672025-03-07T23:12:32.998ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160682025-03-07T23:12:32.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
160692025-03-07T23:12:33.000ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160702025-03-07T23:12:33.000ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160712025-03-07T23:12:33.000ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160722025-03-07T23:12:33.001ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160732025-03-07T23:12:33.002ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160742025-03-07T23:12:33.002ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160752025-03-07T23:12:33.002ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160762025-03-07T23:12:33.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160772025-03-07T23:12:33.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160782025-03-07T23:12:33.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
160792025-03-07T23:12:33.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160802025-03-07T23:12:33.009ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160812025-03-07T23:12:33.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160822025-03-07T23:12:33.011ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
160832025-03-07T23:12:33.011ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160842025-03-07T23:12:33.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160852025-03-07T23:12:33.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160862025-03-07T23:12:33.013ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160872025-03-07T23:12:33.015ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160882025-03-07T23:12:33.016ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160892025-03-07T23:12:33.016ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160902025-03-07T23:12:33.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160912025-03-07T23:12:33.018ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160922025-03-07T23:12:33.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
160932025-03-07T23:12:33.021ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d uri = /v1/system/silos/demo-silo
160942025-03-07T23:12:33.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database uri = /v1/system/silos/demo-silo
160952025-03-07T23:12:33.023ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
160962025-03-07T23:12:33.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
160972025-03-07T23:12:33.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
160982025-03-07T23:12:33.025ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo
160992025-03-07T23:12:33.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database uri = /v1/system/silos/demo-silo
161002025-03-07T23:12:33.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
161012025-03-07T23:12:33.025ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
161022025-03-07T23:12:33.027ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
161032025-03-07T23:12:33.027ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database uri = /v1/system/silos/demo-silo
161042025-03-07T23:12:33.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
161052025-03-07T23:12:33.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
161062025-03-07T23:12:33.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
161072025-03-07T23:12:33.039ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo
161082025-03-07T23:12:33.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 44908 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 28a10347-7cc8-44e8-b37d-0ca7d1378b7d response_code = 404 uri = /v1/system/silos/demo-silo
161092025-03-07T23:12:33.040ZINFOtest_unauthorized (external client test context): client received response status = 404
161102025-03-07T23:12:33.040ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo
161112025-03-07T23:12:33.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161122025-03-07T23:12:33.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc uri = /v1/system/silos/demo-silo
161132025-03-07T23:12:33.041ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc uri = /v1/system/silos/demo-silo
161142025-03-07T23:12:33.041ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc uri = /v1/system/silos/demo-silo
161152025-03-07T23:12:33.041ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc uri = /v1/system/silos/demo-silo
161162025-03-07T23:12:33.041ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc resource = Database uri = /v1/system/silos/demo-silo
161172025-03-07T23:12:33.041ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
161182025-03-07T23:12:33.041ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo
161192025-03-07T23:12:33.041ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 822 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8c1c9972-2a6d-4968-b323-09dd95df41fc response_code = 401 uri = /v1/system/silos/demo-silo
161202025-03-07T23:12:33.042ZINFOtest_unauthorized (external client test context): client received response status = 401
161212025-03-07T23:12:33.042ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo
161222025-03-07T23:12:33.042ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161232025-03-07T23:12:33.042ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de5c07f2-47c9-4553-b597-86aad0a47f5c uri = /v1/system/silos/demo-silo
161242025-03-07T23:12:33.042ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de5c07f2-47c9-4553-b597-86aad0a47f5c uri = /v1/system/silos/demo-silo
161252025-03-07T23:12:33.042ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de5c07f2-47c9-4553-b597-86aad0a47f5c uri = /v1/system/silos/demo-silo
161262025-03-07T23:12:33.042ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 166 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de5c07f2-47c9-4553-b597-86aad0a47f5c response_code = 401 uri = /v1/system/silos/demo-silo
161272025-03-07T23:12:33.042ZINFOtest_unauthorized (external client test context): client received response status = 401
161282025-03-07T23:12:33.042ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo
161292025-03-07T23:12:33.042ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161302025-03-07T23:12:33.042ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e6de840b-a149-4774-a4e3-b3104f567d6b uri = /v1/system/silos/demo-silo
161312025-03-07T23:12:33.042ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e6de840b-a149-4774-a4e3-b3104f567d6b uri = /v1/system/silos/demo-silo
161322025-03-07T23:12:33.043ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:450:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:461:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e6de840b-a149-4774-a4e3-b3104f567d6b uri = /v1/system/silos/demo-silo
161332025-03-07T23:12:33.043ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 791 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e6de840b-a149-4774-a4e3-b3104f567d6b response_code = 401 uri = /v1/system/silos/demo-silo
161342025-03-07T23:12:33.043ZINFOtest_unauthorized (external client test context): client received response status = 401
161352025-03-07T23:12:33.043ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo
161362025-03-07T23:12:33.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161372025-03-07T23:12:33.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 92be0fc5-9544-49da-8797-46756c60b142 uri = /v1/system/silos/demo-silo
161382025-03-07T23:12:33.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 92be0fc5-9544-49da-8797-46756c60b142 response_code = 405 uri = /v1/system/silos/demo-silo
161392025-03-07T23:12:33.044ZINFOtest_unauthorized (external client test context): client received response status = 405
161402025-03-07T23:12:33.044ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo
161412025-03-07T23:12:33.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161422025-03-07T23:12:33.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 279206a5-fd7d-4120-a076-635e3a2e8604 uri = /v1/system/silos/demo-silo
161432025-03-07T23:12:33.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 279206a5-fd7d-4120-a076-635e3a2e8604 response_code = 405 uri = /v1/system/silos/demo-silo
161442025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client received response status = 405
161452025-03-07T23:12:33.051ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo
161462025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161472025-03-07T23:12:33.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c84750a6-4e65-4fa5-9e32-50ad1e4e58bd uri = /v1/system/silos/demo-silo
161482025-03-07T23:12:33.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c84750a6-4e65-4fa5-9e32-50ad1e4e58bd response_code = 405 uri = /v1/system/silos/demo-silo
161492025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client received response status = 405
161502025-03-07T23:12:33.051ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo
161512025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161522025-03-07T23:12:33.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 812d7d72-bc76-49d7-995b-9cf2d37cdb80 uri = /v1/system/silos/demo-silo
161532025-03-07T23:12:33.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 812d7d72-bc76-49d7-995b-9cf2d37cdb80 response_code = 405 uri = /v1/system/silos/demo-silo
161542025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client received response status = 405
161552025-03-07T23:12:33.051ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo
161562025-03-07T23:12:33.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161572025-03-07T23:12:33.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 175e87e2-cc85-4cd1-8ac7-527f8bfbb0d9 uri = /v1/system/silos/demo-silo
161582025-03-07T23:12:33.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 175e87e2-cc85-4cd1-8ac7-527f8bfbb0d9 response_code = 405 uri = /v1/system/silos/demo-silo
161592025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client received response status = 405
161602025-03-07T23:12:33.052ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo
161612025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161622025-03-07T23:12:33.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 296123b1-a8c2-42e3-9ac3-56d9a090301d uri = /v1/system/silos/demo-silo
161632025-03-07T23:12:33.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 296123b1-a8c2-42e3-9ac3-56d9a090301d response_code = 405 uri = /v1/system/silos/demo-silo
161642025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client received response status = 405
161652025-03-07T23:12:33.052ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo
161662025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161672025-03-07T23:12:33.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d8e26b7-e094-4468-b80d-c43dc1de663a uri = /v1/system/silos/demo-silo
161682025-03-07T23:12:33.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d8e26b7-e094-4468-b80d-c43dc1de663a response_code = 405 uri = /v1/system/silos/demo-silo
161692025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client received response status = 405
161702025-03-07T23:12:33.052ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo
161712025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161722025-03-07T23:12:33.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c37a0725-0ba1-4128-8ab4-e42dfadeaf69 uri = /v1/system/silos/demo-silo
161732025-03-07T23:12:33.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c37a0725-0ba1-4128-8ab4-e42dfadeaf69 response_code = 405 uri = /v1/system/silos/demo-silo
161742025-03-07T23:12:33.052ZINFOtest_unauthorized (external client test context): client received response status = 405
161752025-03-07T23:12:33.052ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo
161762025-03-07T23:12:33.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
161772025-03-07T23:12:33.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e uri = /v1/system/silos/demo-silo
161782025-03-07T23:12:33.054ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e uri = /v1/system/silos/demo-silo
161792025-03-07T23:12:33.054ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo
161802025-03-07T23:12:33.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161812025-03-07T23:12:33.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161822025-03-07T23:12:33.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161832025-03-07T23:12:33.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161842025-03-07T23:12:33.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161852025-03-07T23:12:33.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161862025-03-07T23:12:33.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
161872025-03-07T23:12:33.054ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
161882025-03-07T23:12:33.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161892025-03-07T23:12:33.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161902025-03-07T23:12:33.055ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161912025-03-07T23:12:33.056ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
161922025-03-07T23:12:33.056ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161932025-03-07T23:12:33.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161942025-03-07T23:12:33.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161952025-03-07T23:12:33.057ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
161962025-03-07T23:12:33.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
161972025-03-07T23:12:33.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161982025-03-07T23:12:33.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161992025-03-07T23:12:33.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162002025-03-07T23:12:33.075ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
162012025-03-07T23:12:33.075ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162022025-03-07T23:12:33.075ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162032025-03-07T23:12:33.075ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162042025-03-07T23:12:33.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162052025-03-07T23:12:33.076ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
162062025-03-07T23:12:33.076ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162072025-03-07T23:12:33.076ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162082025-03-07T23:12:33.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162092025-03-07T23:12:33.076ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
162102025-03-07T23:12:33.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
162112025-03-07T23:12:33.076ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e uri = /v1/system/silos/demo-silo
162122025-03-07T23:12:33.076ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database uri = /v1/system/silos/demo-silo
162132025-03-07T23:12:33.076ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162142025-03-07T23:12:33.076ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162152025-03-07T23:12:33.079ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
162162025-03-07T23:12:33.080ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo
162172025-03-07T23:12:33.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database uri = /v1/system/silos/demo-silo
162182025-03-07T23:12:33.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162192025-03-07T23:12:33.080ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162202025-03-07T23:12:33.083ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
162212025-03-07T23:12:33.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database uri = /v1/system/silos/demo-silo
162222025-03-07T23:12:33.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162232025-03-07T23:12:33.084ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162242025-03-07T23:12:33.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162252025-03-07T23:12:33.101ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo
162262025-03-07T23:12:33.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 53788 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5279e0a2-c277-4fda-a69e-2b50cced0a7e response_code = 404 uri = /v1/system/silos/demo-silo
162272025-03-07T23:12:33.102ZINFOtest_unauthorized (external client test context): client received response status = 404
162282025-03-07T23:12:33.103ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo
162292025-03-07T23:12:33.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162302025-03-07T23:12:33.103ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 uri = /v1/system/silos/demo-silo
162312025-03-07T23:12:33.103ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 uri = /v1/system/silos/demo-silo
162322025-03-07T23:12:33.103ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 uri = /v1/system/silos/demo-silo
162332025-03-07T23:12:33.103ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 uri = /v1/system/silos/demo-silo
162342025-03-07T23:12:33.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 resource = Database uri = /v1/system/silos/demo-silo
162352025-03-07T23:12:33.103ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162362025-03-07T23:12:33.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo
162372025-03-07T23:12:33.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1135 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0c94615-71a0-48e8-8f00-86635a1a0597 response_code = 401 uri = /v1/system/silos/demo-silo
162382025-03-07T23:12:33.112ZINFOtest_unauthorized (external client test context): client received response status = 401
162392025-03-07T23:12:33.112ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo
162402025-03-07T23:12:33.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162412025-03-07T23:12:33.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2cf1fde3-e102-475c-9c7b-5424328e9e1f uri = /v1/system/silos/demo-silo
162422025-03-07T23:12:33.112ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2cf1fde3-e102-475c-9c7b-5424328e9e1f uri = /v1/system/silos/demo-silo
162432025-03-07T23:12:33.112ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2cf1fde3-e102-475c-9c7b-5424328e9e1f uri = /v1/system/silos/demo-silo
162442025-03-07T23:12:33.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 187 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2cf1fde3-e102-475c-9c7b-5424328e9e1f response_code = 401 uri = /v1/system/silos/demo-silo
162452025-03-07T23:12:33.113ZINFOtest_unauthorized (external client test context): client received response status = 401
162462025-03-07T23:12:33.113ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo
162472025-03-07T23:12:33.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162482025-03-07T23:12:33.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 89a7bdfa-aa12-4e38-b3e7-9656c67163fa uri = /v1/system/silos/demo-silo
162492025-03-07T23:12:33.114ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 89a7bdfa-aa12-4e38-b3e7-9656c67163fa uri = /v1/system/silos/demo-silo
162502025-03-07T23:12:33.114ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:512:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:523:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 89a7bdfa-aa12-4e38-b3e7-9656c67163fa uri = /v1/system/silos/demo-silo
162512025-03-07T23:12:33.114ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 926 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 89a7bdfa-aa12-4e38-b3e7-9656c67163fa response_code = 401 uri = /v1/system/silos/demo-silo
162522025-03-07T23:12:33.116ZINFOtest_unauthorized (external client test context): client received response status = 401
162532025-03-07T23:12:33.116ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo
162542025-03-07T23:12:33.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162552025-03-07T23:12:33.116ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 39ffa5a8-de18-4e04-ab80-482e3cce09dd uri = /v1/system/silos/demo-silo
162562025-03-07T23:12:33.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 39ffa5a8-de18-4e04-ab80-482e3cce09dd response_code = 405 uri = /v1/system/silos/demo-silo
162572025-03-07T23:12:33.117ZINFOtest_unauthorized (external client test context): client received response status = 405
162582025-03-07T23:12:33.117ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo
162592025-03-07T23:12:33.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162602025-03-07T23:12:33.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e11f5dd-b6c9-4603-98a6-f57445da971b uri = /v1/system/silos/demo-silo
162612025-03-07T23:12:33.120ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e11f5dd-b6c9-4603-98a6-f57445da971b response_code = 405 uri = /v1/system/silos/demo-silo
162622025-03-07T23:12:33.120ZINFOtest_unauthorized (external client test context): client received response status = 405
162632025-03-07T23:12:33.120ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo
162642025-03-07T23:12:33.120ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162652025-03-07T23:12:33.120ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8627f220-319f-4228-ad77-84f5f3f76590 uri = /v1/system/silos/demo-silo
162662025-03-07T23:12:33.120ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8627f220-319f-4228-ad77-84f5f3f76590 response_code = 405 uri = /v1/system/silos/demo-silo
162672025-03-07T23:12:33.120ZINFOtest_unauthorized (external client test context): client received response status = 405
162682025-03-07T23:12:33.120ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo
162692025-03-07T23:12:33.120ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162702025-03-07T23:12:33.120ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b65ede43-d523-414e-895d-e911d4091467 uri = /v1/system/silos/demo-silo
162712025-03-07T23:12:33.129ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b65ede43-d523-414e-895d-e911d4091467 response_code = 405 uri = /v1/system/silos/demo-silo
162722025-03-07T23:12:33.129ZINFOtest_unauthorized (external client test context): client received response status = 405
162732025-03-07T23:12:33.129ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo
162742025-03-07T23:12:33.129ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo
162752025-03-07T23:12:33.129ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 uri = /v1/system/silos/demo-silo
162762025-03-07T23:12:33.129ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 uri = /v1/system/silos/demo-silo
162772025-03-07T23:12:33.129ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo
162782025-03-07T23:12:33.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162792025-03-07T23:12:33.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162802025-03-07T23:12:33.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162812025-03-07T23:12:33.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162822025-03-07T23:12:33.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162832025-03-07T23:12:33.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162842025-03-07T23:12:33.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
162852025-03-07T23:12:33.134ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162862025-03-07T23:12:33.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162872025-03-07T23:12:33.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162882025-03-07T23:12:33.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162892025-03-07T23:12:33.134ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
162902025-03-07T23:12:33.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162912025-03-07T23:12:33.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162922025-03-07T23:12:33.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162932025-03-07T23:12:33.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
162942025-03-07T23:12:33.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
162952025-03-07T23:12:33.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162962025-03-07T23:12:33.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162972025-03-07T23:12:33.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162982025-03-07T23:12:33.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
162992025-03-07T23:12:33.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
163002025-03-07T23:12:33.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163012025-03-07T23:12:33.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163022025-03-07T23:12:33.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163032025-03-07T23:12:33.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
163042025-03-07T23:12:33.136ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163052025-03-07T23:12:33.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163062025-03-07T23:12:33.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163072025-03-07T23:12:33.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
163082025-03-07T23:12:33.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
163092025-03-07T23:12:33.136ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 uri = /v1/system/silos/demo-silo
163102025-03-07T23:12:33.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database uri = /v1/system/silos/demo-silo
163112025-03-07T23:12:33.136ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163122025-03-07T23:12:33.136ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163132025-03-07T23:12:33.138ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
163142025-03-07T23:12:33.138ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo
163152025-03-07T23:12:33.138ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database uri = /v1/system/silos/demo-silo
163162025-03-07T23:12:33.139ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163172025-03-07T23:12:33.139ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163182025-03-07T23:12:33.151ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
163192025-03-07T23:12:33.151ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database uri = /v1/system/silos/demo-silo
163202025-03-07T23:12:33.151ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163212025-03-07T23:12:33.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163222025-03-07T23:12:33.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo
163232025-03-07T23:12:33.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo
163242025-03-07T23:12:33.166ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 56943 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9b945f14-20a9-4b5e-8132-2b27116c5bc2 response_code = 200 uri = /v1/system/silos/demo-silo
163252025-03-07T23:12:33.166ZINFOtest_unauthorized (external client test context): client received response status = 200
163262025-03-07T23:12:33.166ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/ip-pools
163272025-03-07T23:12:33.166ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/ip-pools
163282025-03-07T23:12:33.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
163292025-03-07T23:12:33.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 uri = /v1/system/silos/demo-silo/ip-pools
163302025-03-07T23:12:33.168ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 uri = /v1/system/silos/demo-silo/ip-pools
163312025-03-07T23:12:33.168ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/ip-pools
163322025-03-07T23:12:33.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163332025-03-07T23:12:33.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163342025-03-07T23:12:33.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163352025-03-07T23:12:33.171ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163362025-03-07T23:12:33.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163372025-03-07T23:12:33.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163382025-03-07T23:12:33.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
163392025-03-07T23:12:33.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
163402025-03-07T23:12:33.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163412025-03-07T23:12:33.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163422025-03-07T23:12:33.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163432025-03-07T23:12:33.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
163442025-03-07T23:12:33.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163452025-03-07T23:12:33.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163462025-03-07T23:12:33.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163472025-03-07T23:12:33.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
163482025-03-07T23:12:33.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
163492025-03-07T23:12:33.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163502025-03-07T23:12:33.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163512025-03-07T23:12:33.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163522025-03-07T23:12:33.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
163532025-03-07T23:12:33.202ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
163542025-03-07T23:12:33.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163552025-03-07T23:12:33.203ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163562025-03-07T23:12:33.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163572025-03-07T23:12:33.204ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
163582025-03-07T23:12:33.205ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163592025-03-07T23:12:33.205ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163602025-03-07T23:12:33.206ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163612025-03-07T23:12:33.217ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
163622025-03-07T23:12:33.223ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
163632025-03-07T23:12:33.223ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 uri = /v1/system/silos/demo-silo/ip-pools
163642025-03-07T23:12:33.223ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
163652025-03-07T23:12:33.223ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
163662025-03-07T23:12:33.224ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163672025-03-07T23:12:33.225ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
163682025-03-07T23:12:33.225ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
163692025-03-07T23:12:33.225ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
163702025-03-07T23:12:33.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
163712025-03-07T23:12:33.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
163722025-03-07T23:12:33.234ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
163732025-03-07T23:12:33.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
163742025-03-07T23:12:33.234ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
163752025-03-07T23:12:33.235ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163762025-03-07T23:12:33.236ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
163772025-03-07T23:12:33.238ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
163782025-03-07T23:12:33.238ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
163792025-03-07T23:12:33.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
163802025-03-07T23:12:33.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
163812025-03-07T23:12:33.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163822025-03-07T23:12:33.241ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
163832025-03-07T23:12:33.254ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163842025-03-07T23:12:33.255ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = IpPoolList uri = /v1/system/silos/demo-silo/ip-pools
163852025-03-07T23:12:33.255ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
163862025-03-07T23:12:33.255ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
163872025-03-07T23:12:33.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
163882025-03-07T23:12:33.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163892025-03-07T23:12:33.255ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
163902025-03-07T23:12:33.255ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
163912025-03-07T23:12:33.258ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
163922025-03-07T23:12:33.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = IpPoolList result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163932025-03-07T23:12:33.265ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
163942025-03-07T23:12:33.265ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
163952025-03-07T23:12:33.265ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
163962025-03-07T23:12:33.269ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 102042 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 26dae778-7ae3-4a47-9268-020fa49c2cf2 response_code = 200 uri = /v1/system/silos/demo-silo/ip-pools
163972025-03-07T23:12:33.270ZINFOtest_unauthorized (external client test context): client received response status = 200
163982025-03-07T23:12:33.272ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/ip-pools
163992025-03-07T23:12:33.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164002025-03-07T23:12:33.272ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c uri = /v1/system/silos/demo-silo/ip-pools
164012025-03-07T23:12:33.272ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c uri = /v1/system/silos/demo-silo/ip-pools
164022025-03-07T23:12:33.272ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/ip-pools
164032025-03-07T23:12:33.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164042025-03-07T23:12:33.272ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164052025-03-07T23:12:33.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164062025-03-07T23:12:33.273ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164072025-03-07T23:12:33.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164082025-03-07T23:12:33.274ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164092025-03-07T23:12:33.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
164102025-03-07T23:12:33.275ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
164112025-03-07T23:12:33.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164122025-03-07T23:12:33.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164132025-03-07T23:12:33.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164142025-03-07T23:12:33.278ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
164152025-03-07T23:12:33.278ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164162025-03-07T23:12:33.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164172025-03-07T23:12:33.278ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164182025-03-07T23:12:33.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
164192025-03-07T23:12:33.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
164202025-03-07T23:12:33.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164212025-03-07T23:12:33.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164222025-03-07T23:12:33.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164232025-03-07T23:12:33.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
164242025-03-07T23:12:33.293ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
164252025-03-07T23:12:33.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164262025-03-07T23:12:33.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164272025-03-07T23:12:33.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164282025-03-07T23:12:33.294ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
164292025-03-07T23:12:33.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164302025-03-07T23:12:33.297ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164312025-03-07T23:12:33.297ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164322025-03-07T23:12:33.297ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
164332025-03-07T23:12:33.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
164342025-03-07T23:12:33.301ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c uri = /v1/system/silos/demo-silo/ip-pools
164352025-03-07T23:12:33.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database uri = /v1/system/silos/demo-silo/ip-pools
164362025-03-07T23:12:33.301ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
164372025-03-07T23:12:33.301ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
164382025-03-07T23:12:33.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
164392025-03-07T23:12:33.306ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
164402025-03-07T23:12:33.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database uri = /v1/system/silos/demo-silo/ip-pools
164412025-03-07T23:12:33.306ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
164422025-03-07T23:12:33.311ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
164432025-03-07T23:12:33.314ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
164442025-03-07T23:12:33.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database uri = /v1/system/silos/demo-silo/ip-pools
164452025-03-07T23:12:33.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
164462025-03-07T23:12:33.314ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
164472025-03-07T23:12:33.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
164482025-03-07T23:12:33.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/ip-pools
164492025-03-07T23:12:33.330ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 55155 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a08c0b6-47bc-45ae-99cf-f123dab7047c response_code = 404 uri = /v1/system/silos/demo-silo/ip-pools
164502025-03-07T23:12:33.330ZINFOtest_unauthorized (external client test context): client received response status = 404
164512025-03-07T23:12:33.330ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/ip-pools
164522025-03-07T23:12:33.331ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164532025-03-07T23:12:33.331ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 uri = /v1/system/silos/demo-silo/ip-pools
164542025-03-07T23:12:33.331ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 uri = /v1/system/silos/demo-silo/ip-pools
164552025-03-07T23:12:33.331ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 uri = /v1/system/silos/demo-silo/ip-pools
164562025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 uri = /v1/system/silos/demo-silo/ip-pools
164572025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
164582025-03-07T23:12:33.332ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
164592025-03-07T23:12:33.332ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/ip-pools
164602025-03-07T23:12:33.332ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
164612025-03-07T23:12:33.332ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 934 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e457642a-acd1-4736-876a-7a9afbb260f1 response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
164622025-03-07T23:12:33.332ZINFOtest_unauthorized (external client test context): client received response status = 401
164632025-03-07T23:12:33.332ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/ip-pools
164642025-03-07T23:12:33.332ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164652025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74882a41-3e55-4356-85d0-db52be1cf863 uri = /v1/system/silos/demo-silo/ip-pools
164662025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74882a41-3e55-4356-85d0-db52be1cf863 uri = /v1/system/silos/demo-silo/ip-pools
164672025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74882a41-3e55-4356-85d0-db52be1cf863 uri = /v1/system/silos/demo-silo/ip-pools
164682025-03-07T23:12:33.332ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 156 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74882a41-3e55-4356-85d0-db52be1cf863 response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
164692025-03-07T23:12:33.332ZINFOtest_unauthorized (external client test context): client received response status = 401
164702025-03-07T23:12:33.332ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/ip-pools
164712025-03-07T23:12:33.332ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164722025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3244e742-776e-4fd6-9692-59abe648233f uri = /v1/system/silos/demo-silo/ip-pools
164732025-03-07T23:12:33.332ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3244e742-776e-4fd6-9692-59abe648233f uri = /v1/system/silos/demo-silo/ip-pools
164742025-03-07T23:12:33.333ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:472:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:502:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3244e742-776e-4fd6-9692-59abe648233f uri = /v1/system/silos/demo-silo/ip-pools
164752025-03-07T23:12:33.333ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 892 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3244e742-776e-4fd6-9692-59abe648233f response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
164762025-03-07T23:12:33.333ZINFOtest_unauthorized (external client test context): client received response status = 401
164772025-03-07T23:12:33.333ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/ip-pools
164782025-03-07T23:12:33.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164792025-03-07T23:12:33.333ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 86e18d44-9cca-48e9-94f5-5e6d19045bfb uri = /v1/system/silos/demo-silo/ip-pools
164802025-03-07T23:12:33.333ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 86e18d44-9cca-48e9-94f5-5e6d19045bfb response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
164812025-03-07T23:12:33.333ZINFOtest_unauthorized (external client test context): client received response status = 405
164822025-03-07T23:12:33.333ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/ip-pools
164832025-03-07T23:12:33.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164842025-03-07T23:12:33.333ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 28ffd69b-3116-4944-a015-6f882d496099 uri = /v1/system/silos/demo-silo/ip-pools
164852025-03-07T23:12:33.333ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 28ffd69b-3116-4944-a015-6f882d496099 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
164862025-03-07T23:12:33.333ZINFOtest_unauthorized (external client test context): client received response status = 405
164872025-03-07T23:12:33.333ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/ip-pools
164882025-03-07T23:12:33.334ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164892025-03-07T23:12:33.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64633cc3-83a2-46f7-af44-60ba9f14df5a uri = /v1/system/silos/demo-silo/ip-pools
164902025-03-07T23:12:33.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64633cc3-83a2-46f7-af44-60ba9f14df5a response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
164912025-03-07T23:12:33.336ZINFOtest_unauthorized (external client test context): client received response status = 405
164922025-03-07T23:12:33.336ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/ip-pools
164932025-03-07T23:12:33.336ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164942025-03-07T23:12:33.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 961f1f0d-a17e-4b7a-abb1-c3c67136bdf5 uri = /v1/system/silos/demo-silo/ip-pools
164952025-03-07T23:12:33.337ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 93 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 961f1f0d-a17e-4b7a-abb1-c3c67136bdf5 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
164962025-03-07T23:12:33.337ZINFOtest_unauthorized (external client test context): client received response status = 405
164972025-03-07T23:12:33.337ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/ip-pools
164982025-03-07T23:12:33.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
164992025-03-07T23:12:33.337ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = daef324b-f2ed-422b-83e7-cc41f2009739 uri = /v1/system/silos/demo-silo/ip-pools
165002025-03-07T23:12:33.338ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = daef324b-f2ed-422b-83e7-cc41f2009739 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165012025-03-07T23:12:33.338ZINFOtest_unauthorized (external client test context): client received response status = 405
165022025-03-07T23:12:33.338ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/ip-pools
165032025-03-07T23:12:33.338ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165042025-03-07T23:12:33.338ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1bf2470c-4c9f-4268-bb17-f96befe92eb1 uri = /v1/system/silos/demo-silo/ip-pools
165052025-03-07T23:12:33.338ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1bf2470c-4c9f-4268-bb17-f96befe92eb1 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165062025-03-07T23:12:33.338ZINFOtest_unauthorized (external client test context): client received response status = 405
165072025-03-07T23:12:33.338ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/ip-pools
165082025-03-07T23:12:33.338ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165092025-03-07T23:12:33.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c4b18d80-2896-4237-9238-7f986b87c798 uri = /v1/system/silos/demo-silo/ip-pools
165102025-03-07T23:12:33.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c4b18d80-2896-4237-9238-7f986b87c798 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165112025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client received response status = 405
165122025-03-07T23:12:33.339ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/ip-pools
165132025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165142025-03-07T23:12:33.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 741fadbf-a9a4-413e-9745-49101c89a6b2 uri = /v1/system/silos/demo-silo/ip-pools
165152025-03-07T23:12:33.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 741fadbf-a9a4-413e-9745-49101c89a6b2 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165162025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client received response status = 405
165172025-03-07T23:12:33.339ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/ip-pools
165182025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165192025-03-07T23:12:33.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45a622af-cf9d-4b0a-8598-623625cb1e66 uri = /v1/system/silos/demo-silo/ip-pools
165202025-03-07T23:12:33.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45a622af-cf9d-4b0a-8598-623625cb1e66 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165212025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client received response status = 405
165222025-03-07T23:12:33.339ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/ip-pools
165232025-03-07T23:12:33.339ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165242025-03-07T23:12:33.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 98191171-c9ad-41b4-b712-be367fa12c0b uri = /v1/system/silos/demo-silo/ip-pools
165252025-03-07T23:12:33.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 98191171-c9ad-41b4-b712-be367fa12c0b response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165262025-03-07T23:12:33.340ZINFOtest_unauthorized (external client test context): client received response status = 405
165272025-03-07T23:12:33.340ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/ip-pools
165282025-03-07T23:12:33.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165292025-03-07T23:12:33.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6a18300-e1a1-4efc-b404-db08f1f78b92 uri = /v1/system/silos/demo-silo/ip-pools
165302025-03-07T23:12:33.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6a18300-e1a1-4efc-b404-db08f1f78b92 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165312025-03-07T23:12:33.340ZINFOtest_unauthorized (external client test context): client received response status = 405
165322025-03-07T23:12:33.340ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/ip-pools
165332025-03-07T23:12:33.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165342025-03-07T23:12:33.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b9710da-263b-4357-8ff4-590ada1e65ac uri = /v1/system/silos/demo-silo/ip-pools
165352025-03-07T23:12:33.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 650 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b9710da-263b-4357-8ff4-590ada1e65ac response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165362025-03-07T23:12:33.340ZINFOtest_unauthorized (external client test context): client received response status = 405
165372025-03-07T23:12:33.341ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/ip-pools
165382025-03-07T23:12:33.341ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165392025-03-07T23:12:33.341ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2c3b3b10-61f7-4d93-97a8-bea2adc752be uri = /v1/system/silos/demo-silo/ip-pools
165402025-03-07T23:12:33.342ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2c3b3b10-61f7-4d93-97a8-bea2adc752be response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165412025-03-07T23:12:33.342ZINFOtest_unauthorized (external client test context): client received response status = 405
165422025-03-07T23:12:33.342ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/ip-pools
165432025-03-07T23:12:33.342ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165442025-03-07T23:12:33.342ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f83158c-ea19-4643-9c0b-c4c868d15a0d uri = /v1/system/silos/demo-silo/ip-pools
165452025-03-07T23:12:33.342ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f83158c-ea19-4643-9c0b-c4c868d15a0d response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165462025-03-07T23:12:33.342ZINFOtest_unauthorized (external client test context): client received response status = 405
165472025-03-07T23:12:33.343ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/ip-pools
165482025-03-07T23:12:33.343ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165492025-03-07T23:12:33.343ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe26f622-5d09-4464-b7ce-8ce8b49e38bb uri = /v1/system/silos/demo-silo/ip-pools
165502025-03-07T23:12:33.343ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 176 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe26f622-5d09-4464-b7ce-8ce8b49e38bb response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165512025-03-07T23:12:33.343ZINFOtest_unauthorized (external client test context): client received response status = 405
165522025-03-07T23:12:33.344ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/ip-pools
165532025-03-07T23:12:33.344ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165542025-03-07T23:12:33.344ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8618505c-cf36-4806-8fa4-2467af2ab31c uri = /v1/system/silos/demo-silo/ip-pools
165552025-03-07T23:12:33.344ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8618505c-cf36-4806-8fa4-2467af2ab31c response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
165562025-03-07T23:12:33.344ZINFOtest_unauthorized (external client test context): client received response status = 405
165572025-03-07T23:12:33.344ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/ip-pools
165582025-03-07T23:12:33.344ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/ip-pools
165592025-03-07T23:12:33.344ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 uri = /v1/system/silos/demo-silo/ip-pools
165602025-03-07T23:12:33.344ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 uri = /v1/system/silos/demo-silo/ip-pools
165612025-03-07T23:12:33.344ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/ip-pools
165622025-03-07T23:12:33.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165632025-03-07T23:12:33.345ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165642025-03-07T23:12:33.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165652025-03-07T23:12:33.349ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165662025-03-07T23:12:33.349ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165672025-03-07T23:12:33.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165682025-03-07T23:12:33.352ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
165692025-03-07T23:12:33.353ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165702025-03-07T23:12:33.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165712025-03-07T23:12:33.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165722025-03-07T23:12:33.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165732025-03-07T23:12:33.354ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165742025-03-07T23:12:33.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165752025-03-07T23:12:33.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165762025-03-07T23:12:33.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165772025-03-07T23:12:33.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165782025-03-07T23:12:33.360ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
165792025-03-07T23:12:33.360ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165802025-03-07T23:12:33.362ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165812025-03-07T23:12:33.362ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165822025-03-07T23:12:33.363ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
165832025-03-07T23:12:33.363ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165842025-03-07T23:12:33.363ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165852025-03-07T23:12:33.363ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165862025-03-07T23:12:33.364ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165872025-03-07T23:12:33.371ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165882025-03-07T23:12:33.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165892025-03-07T23:12:33.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165902025-03-07T23:12:33.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165912025-03-07T23:12:33.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165922025-03-07T23:12:33.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
165932025-03-07T23:12:33.374ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 uri = /v1/system/silos/demo-silo/ip-pools
165942025-03-07T23:12:33.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
165952025-03-07T23:12:33.377ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
165962025-03-07T23:12:33.377ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
165972025-03-07T23:12:33.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
165982025-03-07T23:12:33.380ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
165992025-03-07T23:12:33.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166002025-03-07T23:12:33.380ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166012025-03-07T23:12:33.381ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166022025-03-07T23:12:33.386ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
166032025-03-07T23:12:33.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166042025-03-07T23:12:33.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166052025-03-07T23:12:33.387ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166062025-03-07T23:12:33.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
166072025-03-07T23:12:33.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166082025-03-07T23:12:33.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = IpPoolList uri = /v1/system/silos/demo-silo/ip-pools
166092025-03-07T23:12:33.396ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
166102025-03-07T23:12:33.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166112025-03-07T23:12:33.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166122025-03-07T23:12:33.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166132025-03-07T23:12:33.406ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
166142025-03-07T23:12:33.412ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = IpPoolList result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166152025-03-07T23:12:33.414ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166162025-03-07T23:12:33.414ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166172025-03-07T23:12:33.414ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166182025-03-07T23:12:33.418ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 73922 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14bcd83d-b010-4a9a-afd8-6e75035db858 response_code = 200 uri = /v1/system/silos/demo-silo/ip-pools
166192025-03-07T23:12:33.418ZINFOtest_unauthorized (external client test context): client received response status = 200
166202025-03-07T23:12:33.418ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/policy
166212025-03-07T23:12:33.418ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/policy
166222025-03-07T23:12:33.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
166232025-03-07T23:12:33.419ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe uri = /v1/system/silos/demo-silo/policy
166242025-03-07T23:12:33.419ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe uri = /v1/system/silos/demo-silo/policy
166252025-03-07T23:12:33.419ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/policy
166262025-03-07T23:12:33.420ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166272025-03-07T23:12:33.420ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166282025-03-07T23:12:33.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166292025-03-07T23:12:33.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166302025-03-07T23:12:33.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166312025-03-07T23:12:33.425ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166322025-03-07T23:12:33.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
166332025-03-07T23:12:33.425ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
166342025-03-07T23:12:33.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166352025-03-07T23:12:33.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166362025-03-07T23:12:33.426ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166372025-03-07T23:12:33.427ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
166382025-03-07T23:12:33.428ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166392025-03-07T23:12:33.428ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166402025-03-07T23:12:33.428ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166412025-03-07T23:12:33.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
166422025-03-07T23:12:33.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
166432025-03-07T23:12:33.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166442025-03-07T23:12:33.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166452025-03-07T23:12:33.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166462025-03-07T23:12:33.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
166472025-03-07T23:12:33.437ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
166482025-03-07T23:12:33.437ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166492025-03-07T23:12:33.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166502025-03-07T23:12:33.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166512025-03-07T23:12:33.438ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
166522025-03-07T23:12:33.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166532025-03-07T23:12:33.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166542025-03-07T23:12:33.439ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166552025-03-07T23:12:33.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
166562025-03-07T23:12:33.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
166572025-03-07T23:12:33.462ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe uri = /v1/system/silos/demo-silo/policy
166582025-03-07T23:12:33.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166592025-03-07T23:12:33.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166602025-03-07T23:12:33.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166612025-03-07T23:12:33.465ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
166622025-03-07T23:12:33.466ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
166632025-03-07T23:12:33.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166642025-03-07T23:12:33.466ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166652025-03-07T23:12:33.466ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166662025-03-07T23:12:33.468ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
166672025-03-07T23:12:33.469ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166682025-03-07T23:12:33.469ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166692025-03-07T23:12:33.469ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166702025-03-07T23:12:33.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
166712025-03-07T23:12:33.480ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166722025-03-07T23:12:33.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166732025-03-07T23:12:33.482ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166742025-03-07T23:12:33.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166752025-03-07T23:12:33.482ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
166762025-03-07T23:12:33.482ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
166772025-03-07T23:12:33.482ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
166782025-03-07T23:12:33.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
166792025-03-07T23:12:33.483ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
166802025-03-07T23:12:33.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166812025-03-07T23:12:33.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166822025-03-07T23:12:33.483ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166832025-03-07T23:12:33.484ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
166842025-03-07T23:12:33.485ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database uri = /v1/system/silos/demo-silo/policy
166852025-03-07T23:12:33.485ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
166862025-03-07T23:12:33.485ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166872025-03-07T23:12:33.488ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
166882025-03-07T23:12:33.498ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
166892025-03-07T23:12:33.499ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54082 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
166902025-03-07T23:12:33.500ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54084 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
166912025-03-07T23:12:33.500ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54086 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
166922025-03-07T23:12:33.501ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 81884 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 84f05f03-da10-4a8a-9e54-b4b6a736dcfe response_code = 200 uri = /v1/system/silos/demo-silo/policy
166932025-03-07T23:12:33.501ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54082 req_id = d84c7c8c-70ea-4ae0-a9af-67e863a5278f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166942025-03-07T23:12:33.501ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54084 req_id = b8a8b594-1610-42bc-81fa-92ed29f41d1e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166952025-03-07T23:12:33.502ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54086 req_id = 2f036058-ff87-4f80-9c38-838485ff6eb5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166962025-03-07T23:12:33.505ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1046 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54082 req_id = d84c7c8c-70ea-4ae0-a9af-67e863a5278f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166972025-03-07T23:12:33.505ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 841 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54084 req_id = b8a8b594-1610-42bc-81fa-92ed29f41d1e response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166982025-03-07T23:12:33.505ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 667 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54086 req_id = 2f036058-ff87-4f80-9c38-838485ff6eb5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
166992025-03-07T23:12:33.505ZINFOtest_unauthorized (external client test context): client received response status = 200
167002025-03-07T23:12:33.505ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/policy
167012025-03-07T23:12:33.505ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
167022025-03-07T23:12:33.505ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54088 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
167032025-03-07T23:12:33.505ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54088 req_id = a5995028-8a9a-4698-a81b-d9a2cceee3d3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167042025-03-07T23:12:33.505ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54090 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
167052025-03-07T23:12:33.505ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb uri = /v1/system/silos/demo-silo/policy
167062025-03-07T23:12:33.506ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb uri = /v1/system/silos/demo-silo/policy
167072025-03-07T23:12:33.506ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/policy
167082025-03-07T23:12:33.506ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167092025-03-07T23:12:33.506ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167102025-03-07T23:12:33.507ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167112025-03-07T23:12:33.507ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1391 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54088 req_id = a5995028-8a9a-4698-a81b-d9a2cceee3d3 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167122025-03-07T23:12:33.507ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54090 req_id = fb7b800d-aa8b-4def-b015-7c653e5f378d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167132025-03-07T23:12:33.507ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 603 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54090 req_id = fb7b800d-aa8b-4def-b015-7c653e5f378d response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167142025-03-07T23:12:33.507ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167152025-03-07T23:12:33.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167162025-03-07T23:12:33.508ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167172025-03-07T23:12:33.509ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54092 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
167182025-03-07T23:12:33.509ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54094 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
167192025-03-07T23:12:33.509ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54092 req_id = 2c3ce29f-a986-4f7c-95c8-373c65fce10f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167202025-03-07T23:12:33.510ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54094 req_id = b4ba00f3-90bd-4faa-864a-6b8bbe231a56 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167212025-03-07T23:12:33.510ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 303 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54092 req_id = 2c3ce29f-a986-4f7c-95c8-373c65fce10f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167222025-03-07T23:12:33.510ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 178 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54094 req_id = b4ba00f3-90bd-4faa-864a-6b8bbe231a56 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
167232025-03-07T23:12:33.510ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
167242025-03-07T23:12:33.511ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
167252025-03-07T23:12:33.511ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167262025-03-07T23:12:33.511ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167272025-03-07T23:12:33.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167282025-03-07T23:12:33.514ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
167292025-03-07T23:12:33.515ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167302025-03-07T23:12:33.515ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167312025-03-07T23:12:33.515ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167322025-03-07T23:12:33.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
167332025-03-07T23:12:33.522ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
167342025-03-07T23:12:33.522ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167352025-03-07T23:12:33.524ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167362025-03-07T23:12:33.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167372025-03-07T23:12:33.529ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
167382025-03-07T23:12:33.533ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
167392025-03-07T23:12:33.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167402025-03-07T23:12:33.533ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167412025-03-07T23:12:33.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167422025-03-07T23:12:33.533ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
167432025-03-07T23:12:33.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167442025-03-07T23:12:33.533ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167452025-03-07T23:12:33.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167462025-03-07T23:12:33.534ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
167472025-03-07T23:12:33.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
167482025-03-07T23:12:33.537ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb uri = /v1/system/silos/demo-silo/policy
167492025-03-07T23:12:33.537ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database uri = /v1/system/silos/demo-silo/policy
167502025-03-07T23:12:33.538ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
167512025-03-07T23:12:33.538ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
167522025-03-07T23:12:33.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
167532025-03-07T23:12:33.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
167542025-03-07T23:12:33.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database uri = /v1/system/silos/demo-silo/policy
167552025-03-07T23:12:33.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
167562025-03-07T23:12:33.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
167572025-03-07T23:12:33.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
167582025-03-07T23:12:33.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database uri = /v1/system/silos/demo-silo/policy
167592025-03-07T23:12:33.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
167602025-03-07T23:12:33.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
167612025-03-07T23:12:33.552ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
167622025-03-07T23:12:33.552ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
167632025-03-07T23:12:33.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/policy
167642025-03-07T23:12:33.570ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 65994 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 97be4672-3bfb-402f-b56c-714145a88cdb response_code = 404 uri = /v1/system/silos/demo-silo/policy
167652025-03-07T23:12:33.571ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
167662025-03-07T23:12:33.571ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
167672025-03-07T23:12:33.571ZINFOtest_unauthorized (external client test context): client received response status = 404
167682025-03-07T23:12:33.572ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/policy
167692025-03-07T23:12:33.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
167702025-03-07T23:12:33.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 uri = /v1/system/silos/demo-silo/policy
167712025-03-07T23:12:33.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
167722025-03-07T23:12:33.572ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 uri = /v1/system/silos/demo-silo/policy
167732025-03-07T23:12:33.573ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 uri = /v1/system/silos/demo-silo/policy
167742025-03-07T23:12:33.573ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 uri = /v1/system/silos/demo-silo/policy
167752025-03-07T23:12:33.573ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 resource = Database uri = /v1/system/silos/demo-silo/policy
167762025-03-07T23:12:33.573ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
167772025-03-07T23:12:33.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/policy
167782025-03-07T23:12:33.573ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 947 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6dfeea48-dab5-4dee-ac5c-5e4b8814bba1 response_code = 401 uri = /v1/system/silos/demo-silo/policy
167792025-03-07T23:12:33.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167802025-03-07T23:12:33.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 53949bec-e26f-4841-8f3e-5476a0a9e6f5 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167812025-03-07T23:12:33.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 53949bec-e26f-4841-8f3e-5476a0a9e6f5 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167822025-03-07T23:12:33.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 53949bec-e26f-4841-8f3e-5476a0a9e6f5 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167832025-03-07T23:12:33.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 53949bec-e26f-4841-8f3e-5476a0a9e6f5 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167842025-03-07T23:12:33.575ZINFOtest_unauthorized (external client test context): client received response status = 401
167852025-03-07T23:12:33.575ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/policy
167862025-03-07T23:12:33.575ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
167872025-03-07T23:12:33.575ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d03ace1b-4961-4d3d-85b1-8476bb0e1a0f uri = /v1/system/silos/demo-silo/policy
167882025-03-07T23:12:33.575ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d03ace1b-4961-4d3d-85b1-8476bb0e1a0f uri = /v1/system/silos/demo-silo/policy
167892025-03-07T23:12:33.576ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d03ace1b-4961-4d3d-85b1-8476bb0e1a0f uri = /v1/system/silos/demo-silo/policy
167902025-03-07T23:12:33.576ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 602 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d03ace1b-4961-4d3d-85b1-8476bb0e1a0f response_code = 401 uri = /v1/system/silos/demo-silo/policy
167912025-03-07T23:12:33.576ZINFOtest_unauthorized (external client test context): client received response status = 401
167922025-03-07T23:12:33.576ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/policy
167932025-03-07T23:12:33.576ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
167942025-03-07T23:12:33.576ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ed8c2c83-3258-46c9-af77-c065f38ed1b4 uri = /v1/system/silos/demo-silo/policy
167952025-03-07T23:12:33.576ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ed8c2c83-3258-46c9-af77-c065f38ed1b4 uri = /v1/system/silos/demo-silo/policy
167962025-03-07T23:12:33.577ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:534:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:545:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ed8c2c83-3258-46c9-af77-c065f38ed1b4 uri = /v1/system/silos/demo-silo/policy
167972025-03-07T23:12:33.578ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1388 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ed8c2c83-3258-46c9-af77-c065f38ed1b4 response_code = 401 uri = /v1/system/silos/demo-silo/policy
167982025-03-07T23:12:33.578ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5002 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 53949bec-e26f-4841-8f3e-5476a0a9e6f5 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
167992025-03-07T23:12:33.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "53949bec-e26f-4841-8f3e-5476a0a9e6f5", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:32 GMT"} })
168002025-03-07T23:12:33.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168012025-03-07T23:12:33.580ZINFOtest_unauthorized (external client test context): client received response status = 401
168022025-03-07T23:12:33.580ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/policy
168032025-03-07T23:12:33.580ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
168042025-03-07T23:12:33.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 76ebf101-1dce-4fc7-9bab-cc981329a9d7 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168052025-03-07T23:12:33.581ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 76ebf101-1dce-4fc7-9bab-cc981329a9d7 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168062025-03-07T23:12:33.581ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 76ebf101-1dce-4fc7-9bab-cc981329a9d7 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168072025-03-07T23:12:33.581ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 76ebf101-1dce-4fc7-9bab-cc981329a9d7 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168082025-03-07T23:12:33.582ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 uri = /v1/system/silos/demo-silo/policy
168092025-03-07T23:12:33.583ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 uri = /v1/system/silos/demo-silo/policy
168102025-03-07T23:12:33.583ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/policy
168112025-03-07T23:12:33.583ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168122025-03-07T23:12:33.583ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168132025-03-07T23:12:33.583ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168142025-03-07T23:12:33.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5002 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 76ebf101-1dce-4fc7-9bab-cc981329a9d7 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
168152025-03-07T23:12:33.585ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "76ebf101-1dce-4fc7-9bab-cc981329a9d7", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:32 GMT"} })
168162025-03-07T23:12:33.587ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168172025-03-07T23:12:33.587ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168182025-03-07T23:12:33.587ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
168192025-03-07T23:12:33.587ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168202025-03-07T23:12:33.587ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168212025-03-07T23:12:33.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168222025-03-07T23:12:33.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168232025-03-07T23:12:33.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168242025-03-07T23:12:33.589ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168252025-03-07T23:12:33.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168262025-03-07T23:12:33.591ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168272025-03-07T23:12:33.591ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
168282025-03-07T23:12:33.591ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
168292025-03-07T23:12:33.591ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
168302025-03-07T23:12:33.591ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168312025-03-07T23:12:33.591ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168322025-03-07T23:12:33.591ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168332025-03-07T23:12:33.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
168342025-03-07T23:12:33.595ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168352025-03-07T23:12:33.595ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168362025-03-07T23:12:33.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168372025-03-07T23:12:33.595ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
168382025-03-07T23:12:33.598ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
168392025-03-07T23:12:33.599ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168402025-03-07T23:12:33.600ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168412025-03-07T23:12:33.600ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168422025-03-07T23:12:33.602ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
168432025-03-07T23:12:33.602ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
168442025-03-07T23:12:33.602ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168452025-03-07T23:12:33.602ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168462025-03-07T23:12:33.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168472025-03-07T23:12:33.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
168482025-03-07T23:12:33.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168492025-03-07T23:12:33.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168502025-03-07T23:12:33.607ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168512025-03-07T23:12:33.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
168522025-03-07T23:12:33.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
168532025-03-07T23:12:33.612ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 uri = /v1/system/silos/demo-silo/policy
168542025-03-07T23:12:33.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database uri = /v1/system/silos/demo-silo/policy
168552025-03-07T23:12:33.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168562025-03-07T23:12:33.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168572025-03-07T23:12:33.615ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
168582025-03-07T23:12:33.616ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
168592025-03-07T23:12:33.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database uri = /v1/system/silos/demo-silo/policy
168602025-03-07T23:12:33.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168612025-03-07T23:12:33.616ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168622025-03-07T23:12:33.618ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
168632025-03-07T23:12:33.619ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database uri = /v1/system/silos/demo-silo/policy
168642025-03-07T23:12:33.619ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168652025-03-07T23:12:33.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168662025-03-07T23:12:33.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168672025-03-07T23:12:33.639ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/policy
168682025-03-07T23:12:33.639ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 57376 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 338ad709-3366-485c-8502-90d11b553010 response_code = 404 uri = /v1/system/silos/demo-silo/policy
168692025-03-07T23:12:33.639ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168702025-03-07T23:12:33.640ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
168712025-03-07T23:12:33.640ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168722025-03-07T23:12:33.641ZINFOtest_unauthorized (external client test context): client received response status = 404
168732025-03-07T23:12:33.641ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/policy
168742025-03-07T23:12:33.641ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
168752025-03-07T23:12:33.641ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
168762025-03-07T23:12:33.641ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
168772025-03-07T23:12:33.641ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 2ef9a7a2-be97-4914-afa1-b299d11b60b7 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168782025-03-07T23:12:33.742ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 100039 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 2ef9a7a2-be97-4914-afa1-b299d11b60b7 response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168792025-03-07T23:12:33.742ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 uri = /v1/system/silos/demo-silo/policy
168802025-03-07T23:12:33.742ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 uri = /v1/system/silos/demo-silo/policy
168812025-03-07T23:12:33.743ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 uri = /v1/system/silos/demo-silo/policy
168822025-03-07T23:12:33.743ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 uri = /v1/system/silos/demo-silo/policy
168832025-03-07T23:12:33.743ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 resource = Database uri = /v1/system/silos/demo-silo/policy
168842025-03-07T23:12:33.744ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168852025-03-07T23:12:33.745ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/policy
168862025-03-07T23:12:33.745ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168872025-03-07T23:12:33.745ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2233 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7fbb3296-e07c-403e-9835-0393111a9351 response_code = 401 uri = /v1/system/silos/demo-silo/policy
168882025-03-07T23:12:33.856ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168892025-03-07T23:12:33.856ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168902025-03-07T23:12:33.856ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
168912025-03-07T23:12:33.857ZDEBGtest_unauthorized (results-sink): inserting 102 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
168922025-03-07T23:12:33.858ZDEBGtest_unauthorized (results-sink-cluster): inserting 102 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
168932025-03-07T23:12:33.858ZDEBGtest_unauthorized (clickhouse-client): unrolling 102 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
168942025-03-07T23:12:33.941ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
168952025-03-07T23:12:33.942ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
168962025-03-07T23:12:33.942ZINFOtest_unauthorized (external client test context): client received response status = 401
168972025-03-07T23:12:33.943ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/policy
168982025-03-07T23:12:33.944ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
168992025-03-07T23:12:33.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8c9c4e4d-d819-4f1f-bff4-4896987a1c66 uri = /v1/system/silos/demo-silo/policy
169002025-03-07T23:12:33.944ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8c9c4e4d-d819-4f1f-bff4-4896987a1c66 uri = /v1/system/silos/demo-silo/policy
169012025-03-07T23:12:33.944ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8c9c4e4d-d819-4f1f-bff4-4896987a1c66 uri = /v1/system/silos/demo-silo/policy
169022025-03-07T23:12:33.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 639 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8c9c4e4d-d819-4f1f-bff4-4896987a1c66 response_code = 401 uri = /v1/system/silos/demo-silo/policy
169032025-03-07T23:12:33.945ZINFOtest_unauthorized (external client test context): client received response status = 401
169042025-03-07T23:12:33.947ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/policy
169052025-03-07T23:12:33.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169062025-03-07T23:12:33.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e49983e3-cd05-4943-86f6-7a22135ed56c uri = /v1/system/silos/demo-silo/policy
169072025-03-07T23:12:33.949ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e49983e3-cd05-4943-86f6-7a22135ed56c uri = /v1/system/silos/demo-silo/policy
169082025-03-07T23:12:33.950ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:561:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:574:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e49983e3-cd05-4943-86f6-7a22135ed56c uri = /v1/system/silos/demo-silo/policy
169092025-03-07T23:12:33.950ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1347 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e49983e3-cd05-4943-86f6-7a22135ed56c response_code = 401 uri = /v1/system/silos/demo-silo/policy
169102025-03-07T23:12:33.950ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
169112025-03-07T23:12:33.950ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("virtual_machine:check"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "instance_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "nexus_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "project_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "rack_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "reason", field_type: String, source: Metric, description: "" }, FieldSchema { name: "silo_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "sled_agent_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "sled_agent_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "sled_agent_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "state", field_type: String, source: Metric, description: "" }, FieldSchema { name: "vmm_id", field_type: Uuid, source: Target, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:12:33.941788840Z } timeseries_name = virtual_machine:check
169122025-03-07T23:12:33.950ZDEBGtest_unauthorized (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
169132025-03-07T23:12:33.951ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
169142025-03-07T23:12:33.955ZINFOtest_unauthorized (external client test context): client received response status = 401
169152025-03-07T23:12:33.955ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/policy
169162025-03-07T23:12:33.955ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169172025-03-07T23:12:33.957ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40d7e0b6-0720-4877-85fe-e8a0b1b01238 uri = /v1/system/silos/demo-silo/policy
169182025-03-07T23:12:33.957ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 121 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40d7e0b6-0720-4877-85fe-e8a0b1b01238 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169192025-03-07T23:12:33.959ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
169202025-03-07T23:12:33.961ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
169212025-03-07T23:12:33.961ZINFOtest_unauthorized (external client test context): client received response status = 405
169222025-03-07T23:12:33.961ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/policy
169232025-03-07T23:12:33.961ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169242025-03-07T23:12:33.962ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1af94d5-782f-4cd9-8352-c86de9e084d9 uri = /v1/system/silos/demo-silo/policy
169252025-03-07T23:12:33.962ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 227 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1af94d5-782f-4cd9-8352-c86de9e084d9 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169262025-03-07T23:12:33.965ZINFOtest_unauthorized (external client test context): client received response status = 405
169272025-03-07T23:12:33.967ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/policy
169282025-03-07T23:12:33.967ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169292025-03-07T23:12:33.967ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = fields_ipaddr
169302025-03-07T23:12:33.967ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 198 sql = INSERT INTO oximeter.fields_string FORMAT Native
169312025-03-07T23:12:33.967ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3351a6c6-7c61-4db5-a3e7-f76a6577bc6e uri = /v1/system/silos/demo-silo/policy
169322025-03-07T23:12:33.967ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3351a6c6-7c61-4db5-a3e7-f76a6577bc6e response_code = 405 uri = /v1/system/silos/demo-silo/policy
169332025-03-07T23:12:33.968ZINFOtest_unauthorized (external client test context): client received response status = 405
169342025-03-07T23:12:33.969ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/policy
169352025-03-07T23:12:33.969ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169362025-03-07T23:12:33.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9ec59894-6636-4694-8bf0-a1bcaa30fd68 uri = /v1/system/silos/demo-silo/policy
169372025-03-07T23:12:33.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 109 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9ec59894-6636-4694-8bf0-a1bcaa30fd68 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169382025-03-07T23:12:33.980ZINFOtest_unauthorized (external client test context): client received response status = 405
169392025-03-07T23:12:33.980ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/policy
169402025-03-07T23:12:33.980ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169412025-03-07T23:12:33.980ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 198 table_name = fields_string
169422025-03-07T23:12:33.980ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 98 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
169432025-03-07T23:12:33.981ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6730d520-deef-4015-9350-7179a4098971 uri = /v1/system/silos/demo-silo/policy
169442025-03-07T23:12:33.981ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 107 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6730d520-deef-4015-9350-7179a4098971 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169452025-03-07T23:12:33.981ZINFOtest_unauthorized (external client test context): client received response status = 405
169462025-03-07T23:12:33.982ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/policy
169472025-03-07T23:12:33.982ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169482025-03-07T23:12:33.982ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e7e1ba51-95eb-4442-9dfe-cf792c4f743e uri = /v1/system/silos/demo-silo/policy
169492025-03-07T23:12:33.982ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e7e1ba51-95eb-4442-9dfe-cf792c4f743e response_code = 405 uri = /v1/system/silos/demo-silo/policy
169502025-03-07T23:12:33.983ZINFOtest_unauthorized (external client test context): client received response status = 405
169512025-03-07T23:12:33.983ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/policy
169522025-03-07T23:12:33.983ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169532025-03-07T23:12:33.983ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2c778b6f-8605-46b0-a5b7-8dbfb216ffeb uri = /v1/system/silos/demo-silo/policy
169542025-03-07T23:12:33.983ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2c778b6f-8605-46b0-a5b7-8dbfb216ffeb response_code = 405 uri = /v1/system/silos/demo-silo/policy
169552025-03-07T23:12:33.983ZINFOtest_unauthorized (external client test context): client received response status = 405
169562025-03-07T23:12:33.985ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/policy
169572025-03-07T23:12:33.985ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169582025-03-07T23:12:33.985ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eeb92323-1c48-4fd6-8c8e-0771b46d6076 uri = /v1/system/silos/demo-silo/policy
169592025-03-07T23:12:33.985ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eeb92323-1c48-4fd6-8c8e-0771b46d6076 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169602025-03-07T23:12:33.985ZINFOtest_unauthorized (external client test context): client received response status = 405
169612025-03-07T23:12:33.985ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/policy
169622025-03-07T23:12:33.985ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169632025-03-07T23:12:33.985ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 08e16084-50f7-4f28-b02d-dd693824bdd5 uri = /v1/system/silos/demo-silo/policy
169642025-03-07T23:12:33.985ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 08e16084-50f7-4f28-b02d-dd693824bdd5 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169652025-03-07T23:12:33.985ZINFOtest_unauthorized (external client test context): client received response status = 405
169662025-03-07T23:12:33.986ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/policy
169672025-03-07T23:12:33.986ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169682025-03-07T23:12:33.986ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bd1ac20b-eb1d-4d4d-9b29-e37938dac582 uri = /v1/system/silos/demo-silo/policy
169692025-03-07T23:12:33.986ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bd1ac20b-eb1d-4d4d-9b29-e37938dac582 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169702025-03-07T23:12:33.986ZINFOtest_unauthorized (external client test context): client received response status = 405
169712025-03-07T23:12:33.986ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/policy
169722025-03-07T23:12:33.986ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169732025-03-07T23:12:33.986ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 98 table_name = fields_u16
169742025-03-07T23:12:33.986ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 107 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
169752025-03-07T23:12:33.986ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 13ffe8fc-508d-442a-b32c-9aab08d89561 uri = /v1/system/silos/demo-silo/policy
169762025-03-07T23:12:33.986ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 13ffe8fc-508d-442a-b32c-9aab08d89561 response_code = 405 uri = /v1/system/silos/demo-silo/policy
169772025-03-07T23:12:33.986ZINFOtest_unauthorized (external client test context): client received response status = 405
169782025-03-07T23:12:33.986ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/policy
169792025-03-07T23:12:33.986ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169802025-03-07T23:12:33.986ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6404ff8d-8006-484e-8994-053e29f1b2ce uri = /v1/system/silos/demo-silo/policy
169812025-03-07T23:12:33.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6404ff8d-8006-484e-8994-053e29f1b2ce response_code = 405 uri = /v1/system/silos/demo-silo/policy
169822025-03-07T23:12:33.987ZINFOtest_unauthorized (external client test context): client received response status = 405
169832025-03-07T23:12:33.987ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/policy
169842025-03-07T23:12:33.987ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/policy
169852025-03-07T23:12:33.987ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 uri = /v1/system/silos/demo-silo/policy
169862025-03-07T23:12:33.987ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 uri = /v1/system/silos/demo-silo/policy
169872025-03-07T23:12:33.987ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/policy
169882025-03-07T23:12:33.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169892025-03-07T23:12:33.987ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169902025-03-07T23:12:33.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169912025-03-07T23:12:33.988ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 107 table_name = fields_uuid
169922025-03-07T23:12:33.990ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
169932025-03-07T23:12:33.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169942025-03-07T23:12:33.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169952025-03-07T23:12:33.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169962025-03-07T23:12:33.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
169972025-03-07T23:12:33.993ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
169982025-03-07T23:12:33.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169992025-03-07T23:12:33.993ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170002025-03-07T23:12:33.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170012025-03-07T23:12:33.995ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_cumulativeu64
170022025-03-07T23:12:33.995ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 97 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
170032025-03-07T23:12:33.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170042025-03-07T23:12:33.996ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170052025-03-07T23:12:33.996ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170062025-03-07T23:12:33.997ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170072025-03-07T23:12:33.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170082025-03-07T23:12:34.004ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
170092025-03-07T23:12:34.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170102025-03-07T23:12:34.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170112025-03-07T23:12:34.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170122025-03-07T23:12:34.005ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 97 table_name = measurements_histogramu64
170132025-03-07T23:12:34.006ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 4 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
170142025-03-07T23:12:34.007ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
170152025-03-07T23:12:34.007ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
170162025-03-07T23:12:34.007ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170172025-03-07T23:12:34.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170182025-03-07T23:12:34.007ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170192025-03-07T23:12:34.010ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 4 table_name = measurements_i64
170202025-03-07T23:12:34.012ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
170212025-03-07T23:12:34.012ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170222025-03-07T23:12:34.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170232025-03-07T23:12:34.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170242025-03-07T23:12:34.012ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170252025-03-07T23:12:34.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170262025-03-07T23:12:34.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
170272025-03-07T23:12:34.016ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 uri = /v1/system/silos/demo-silo/policy
170282025-03-07T23:12:34.016ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170292025-03-07T23:12:34.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170302025-03-07T23:12:34.017ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170312025-03-07T23:12:34.018ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
170322025-03-07T23:12:34.019ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
170332025-03-07T23:12:34.019ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170342025-03-07T23:12:34.019ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170352025-03-07T23:12:34.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170362025-03-07T23:12:34.022ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
170372025-03-07T23:12:34.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170382025-03-07T23:12:34.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170392025-03-07T23:12:34.022ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170402025-03-07T23:12:34.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
170412025-03-07T23:12:34.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170422025-03-07T23:12:34.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170432025-03-07T23:12:34.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170442025-03-07T23:12:34.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170452025-03-07T23:12:34.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
170462025-03-07T23:12:34.038ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
170472025-03-07T23:12:34.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170482025-03-07T23:12:34.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170492025-03-07T23:12:34.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170502025-03-07T23:12:34.040ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
170512025-03-07T23:12:34.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database uri = /v1/system/silos/demo-silo/policy
170522025-03-07T23:12:34.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170532025-03-07T23:12:34.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170542025-03-07T23:12:34.046ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
170552025-03-07T23:12:34.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170562025-03-07T23:12:34.054ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 66561 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a21c3e6e-2155-4575-ab5e-2e7b7a58d608 response_code = 200 uri = /v1/system/silos/demo-silo/policy
170572025-03-07T23:12:34.055ZINFOtest_unauthorized (external client test context): client received response status = 200
170582025-03-07T23:12:34.056ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/quotas
170592025-03-07T23:12:34.056ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/quotas
170602025-03-07T23:12:34.056ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
170612025-03-07T23:12:34.056ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 uri = /v1/system/silos/demo-silo/quotas
170622025-03-07T23:12:34.056ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 uri = /v1/system/silos/demo-silo/quotas
170632025-03-07T23:12:34.056ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/quotas
170642025-03-07T23:12:34.056ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170652025-03-07T23:12:34.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170662025-03-07T23:12:34.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170672025-03-07T23:12:34.057ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170682025-03-07T23:12:34.057ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170692025-03-07T23:12:34.058ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170702025-03-07T23:12:34.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
170712025-03-07T23:12:34.059ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
170722025-03-07T23:12:34.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170732025-03-07T23:12:34.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170742025-03-07T23:12:34.060ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170752025-03-07T23:12:34.064ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170762025-03-07T23:12:34.064ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170772025-03-07T23:12:34.064ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170782025-03-07T23:12:34.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170792025-03-07T23:12:34.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170802025-03-07T23:12:34.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
170812025-03-07T23:12:34.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170822025-03-07T23:12:34.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170832025-03-07T23:12:34.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170842025-03-07T23:12:34.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
170852025-03-07T23:12:34.074ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
170862025-03-07T23:12:34.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170872025-03-07T23:12:34.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170882025-03-07T23:12:34.074ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170892025-03-07T23:12:34.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170902025-03-07T23:12:34.091ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170912025-03-07T23:12:34.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170922025-03-07T23:12:34.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170932025-03-07T23:12:34.101ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170942025-03-07T23:12:34.101ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
170952025-03-07T23:12:34.101ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 uri = /v1/system/silos/demo-silo/quotas
170962025-03-07T23:12:34.101ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
170972025-03-07T23:12:34.101ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
170982025-03-07T23:12:34.101ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
170992025-03-07T23:12:34.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
171002025-03-07T23:12:34.103ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
171012025-03-07T23:12:34.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
171022025-03-07T23:12:34.103ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171032025-03-07T23:12:34.103ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171042025-03-07T23:12:34.106ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
171052025-03-07T23:12:34.106ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
171062025-03-07T23:12:34.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171072025-03-07T23:12:34.107ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171082025-03-07T23:12:34.109ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
171092025-03-07T23:12:34.120ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171102025-03-07T23:12:34.120ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
171112025-03-07T23:12:34.121ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
171122025-03-07T23:12:34.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
171132025-03-07T23:12:34.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171142025-03-07T23:12:34.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171152025-03-07T23:12:34.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
171162025-03-07T23:12:34.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
171172025-03-07T23:12:34.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171182025-03-07T23:12:34.126ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171192025-03-07T23:12:34.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
171202025-03-07T23:12:34.141ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171212025-03-07T23:12:34.141ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database uri = /v1/system/silos/demo-silo/quotas
171222025-03-07T23:12:34.142ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171232025-03-07T23:12:34.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171242025-03-07T23:12:34.146ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 91498 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4978a56d-5cbd-4cca-be97-549e44360369 response_code = 200 uri = /v1/system/silos/demo-silo/quotas
171252025-03-07T23:12:34.146ZINFOtest_unauthorized (external client test context): client received response status = 200
171262025-03-07T23:12:34.147ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/quotas
171272025-03-07T23:12:34.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
171282025-03-07T23:12:34.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 uri = /v1/system/silos/demo-silo/quotas
171292025-03-07T23:12:34.148ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 uri = /v1/system/silos/demo-silo/quotas
171302025-03-07T23:12:34.148ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/quotas
171312025-03-07T23:12:34.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171322025-03-07T23:12:34.148ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171332025-03-07T23:12:34.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171342025-03-07T23:12:34.150ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171352025-03-07T23:12:34.150ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171362025-03-07T23:12:34.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171372025-03-07T23:12:34.153ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
171382025-03-07T23:12:34.153ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
171392025-03-07T23:12:34.153ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171402025-03-07T23:12:34.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171412025-03-07T23:12:34.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171422025-03-07T23:12:34.155ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
171432025-03-07T23:12:34.155ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171442025-03-07T23:12:34.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171452025-03-07T23:12:34.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171462025-03-07T23:12:34.159ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
171472025-03-07T23:12:34.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
171482025-03-07T23:12:34.162ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171492025-03-07T23:12:34.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171502025-03-07T23:12:34.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171512025-03-07T23:12:34.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
171522025-03-07T23:12:34.166ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
171532025-03-07T23:12:34.166ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171542025-03-07T23:12:34.166ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171552025-03-07T23:12:34.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171562025-03-07T23:12:34.168ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
171572025-03-07T23:12:34.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171582025-03-07T23:12:34.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171592025-03-07T23:12:34.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171602025-03-07T23:12:34.177ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
171612025-03-07T23:12:34.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
171622025-03-07T23:12:34.192ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 uri = /v1/system/silos/demo-silo/quotas
171632025-03-07T23:12:34.192ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database uri = /v1/system/silos/demo-silo/quotas
171642025-03-07T23:12:34.193ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171652025-03-07T23:12:34.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171662025-03-07T23:12:34.199ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
171672025-03-07T23:12:34.200ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
171682025-03-07T23:12:34.200ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database uri = /v1/system/silos/demo-silo/quotas
171692025-03-07T23:12:34.200ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171702025-03-07T23:12:34.200ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171712025-03-07T23:12:34.204ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
171722025-03-07T23:12:34.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database uri = /v1/system/silos/demo-silo/quotas
171732025-03-07T23:12:34.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171742025-03-07T23:12:34.204ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
171752025-03-07T23:12:34.207ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171762025-03-07T23:12:34.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/quotas
171772025-03-07T23:12:34.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 69562 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d5dc55a4-ad1f-4b59-a18f-731439bbb736 response_code = 404 uri = /v1/system/silos/demo-silo/quotas
171782025-03-07T23:12:34.218ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
171792025-03-07T23:12:34.218ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
171802025-03-07T23:12:34.218ZINFOtest_unauthorized (external client test context): client received response status = 404
171812025-03-07T23:12:34.218ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/quotas
171822025-03-07T23:12:34.218ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
171832025-03-07T23:12:34.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 uri = /v1/system/silos/demo-silo/quotas
171842025-03-07T23:12:34.218ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 uri = /v1/system/silos/demo-silo/quotas
171852025-03-07T23:12:34.219ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 uri = /v1/system/silos/demo-silo/quotas
171862025-03-07T23:12:34.219ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 uri = /v1/system/silos/demo-silo/quotas
171872025-03-07T23:12:34.219ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 resource = Database uri = /v1/system/silos/demo-silo/quotas
171882025-03-07T23:12:34.219ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
171892025-03-07T23:12:34.219ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/quotas
171902025-03-07T23:12:34.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1009 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a8e82d0f-f29c-4608-98ab-b2659709bac2 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
171912025-03-07T23:12:34.220ZINFOtest_unauthorized (external client test context): client received response status = 401
171922025-03-07T23:12:34.220ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/quotas
171932025-03-07T23:12:34.220ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
171942025-03-07T23:12:34.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8dcbbcbe-e0dd-4ad2-94c0-06551b9f8c77 uri = /v1/system/silos/demo-silo/quotas
171952025-03-07T23:12:34.220ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8dcbbcbe-e0dd-4ad2-94c0-06551b9f8c77 uri = /v1/system/silos/demo-silo/quotas
171962025-03-07T23:12:34.220ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8dcbbcbe-e0dd-4ad2-94c0-06551b9f8c77 uri = /v1/system/silos/demo-silo/quotas
171972025-03-07T23:12:34.220ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 394 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8dcbbcbe-e0dd-4ad2-94c0-06551b9f8c77 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
171982025-03-07T23:12:34.220ZINFOtest_unauthorized (external client test context): client received response status = 401
171992025-03-07T23:12:34.221ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/quotas
172002025-03-07T23:12:34.221ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172012025-03-07T23:12:34.221ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d847022c-136c-49d2-b0ed-637630feb0bc uri = /v1/system/silos/demo-silo/quotas
172022025-03-07T23:12:34.221ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d847022c-136c-49d2-b0ed-637630feb0bc uri = /v1/system/silos/demo-silo/quotas
172032025-03-07T23:12:34.224ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:349:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:359:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d847022c-136c-49d2-b0ed-637630feb0bc uri = /v1/system/silos/demo-silo/quotas
172042025-03-07T23:12:34.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 893 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d847022c-136c-49d2-b0ed-637630feb0bc response_code = 401 uri = /v1/system/silos/demo-silo/quotas
172052025-03-07T23:12:34.225ZINFOtest_unauthorized (external client test context): client received response status = 401
172062025-03-07T23:12:34.232ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/quotas
172072025-03-07T23:12:34.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172082025-03-07T23:12:34.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 uri = /v1/system/silos/demo-silo/quotas
172092025-03-07T23:12:34.232ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 uri = /v1/system/silos/demo-silo/quotas
172102025-03-07T23:12:34.233ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/quotas
172112025-03-07T23:12:34.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172122025-03-07T23:12:34.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172132025-03-07T23:12:34.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172142025-03-07T23:12:34.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172152025-03-07T23:12:34.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172162025-03-07T23:12:34.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172172025-03-07T23:12:34.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
172182025-03-07T23:12:34.233ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
172192025-03-07T23:12:34.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172202025-03-07T23:12:34.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172212025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172222025-03-07T23:12:34.235ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
172232025-03-07T23:12:34.235ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172242025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172252025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172262025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
172272025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
172282025-03-07T23:12:34.235ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172292025-03-07T23:12:34.235ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172302025-03-07T23:12:34.236ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172312025-03-07T23:12:34.239ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
172322025-03-07T23:12:34.239ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
172332025-03-07T23:12:34.239ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172342025-03-07T23:12:34.239ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172352025-03-07T23:12:34.239ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172362025-03-07T23:12:34.241ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
172372025-03-07T23:12:34.241ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172382025-03-07T23:12:34.241ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172392025-03-07T23:12:34.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172402025-03-07T23:12:34.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
172412025-03-07T23:12:34.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
172422025-03-07T23:12:34.248ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 uri = /v1/system/silos/demo-silo/quotas
172432025-03-07T23:12:34.248ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database uri = /v1/system/silos/demo-silo/quotas
172442025-03-07T23:12:34.248ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172452025-03-07T23:12:34.248ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172462025-03-07T23:12:34.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
172472025-03-07T23:12:34.250ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
172482025-03-07T23:12:34.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database uri = /v1/system/silos/demo-silo/quotas
172492025-03-07T23:12:34.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172502025-03-07T23:12:34.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172512025-03-07T23:12:34.256ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
172522025-03-07T23:12:34.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database uri = /v1/system/silos/demo-silo/quotas
172532025-03-07T23:12:34.261ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172542025-03-07T23:12:34.261ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172552025-03-07T23:12:34.261ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172562025-03-07T23:12:34.278ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/quotas
172572025-03-07T23:12:34.278ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 55815 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36397d12-ef16-498f-985f-107abf846464 response_code = 404 uri = /v1/system/silos/demo-silo/quotas
172582025-03-07T23:12:34.279ZINFOtest_unauthorized (external client test context): client received response status = 404
172592025-03-07T23:12:34.279ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/quotas
172602025-03-07T23:12:34.279ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172612025-03-07T23:12:34.281ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a uri = /v1/system/silos/demo-silo/quotas
172622025-03-07T23:12:34.281ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a uri = /v1/system/silos/demo-silo/quotas
172632025-03-07T23:12:34.281ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a uri = /v1/system/silos/demo-silo/quotas
172642025-03-07T23:12:34.281ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a uri = /v1/system/silos/demo-silo/quotas
172652025-03-07T23:12:34.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a resource = Database uri = /v1/system/silos/demo-silo/quotas
172662025-03-07T23:12:34.281ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172672025-03-07T23:12:34.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/quotas
172682025-03-07T23:12:34.281ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1727 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34ff3a3d-010d-405e-92bc-58454c83556a response_code = 401 uri = /v1/system/silos/demo-silo/quotas
172692025-03-07T23:12:34.283ZINFOtest_unauthorized (external client test context): client received response status = 401
172702025-03-07T23:12:34.283ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/quotas
172712025-03-07T23:12:34.283ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172722025-03-07T23:12:34.283ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 931f013f-8c90-4b9e-adbe-af544cf271be uri = /v1/system/silos/demo-silo/quotas
172732025-03-07T23:12:34.283ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 931f013f-8c90-4b9e-adbe-af544cf271be uri = /v1/system/silos/demo-silo/quotas
172742025-03-07T23:12:34.283ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 931f013f-8c90-4b9e-adbe-af544cf271be uri = /v1/system/silos/demo-silo/quotas
172752025-03-07T23:12:34.283ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 283 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 931f013f-8c90-4b9e-adbe-af544cf271be response_code = 401 uri = /v1/system/silos/demo-silo/quotas
172762025-03-07T23:12:34.283ZINFOtest_unauthorized (external client test context): client received response status = 401
172772025-03-07T23:12:34.283ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/quotas
172782025-03-07T23:12:34.283ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172792025-03-07T23:12:34.284ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30290beb-2668-4cd2-a2e7-72a829d5c955 uri = /v1/system/silos/demo-silo/quotas
172802025-03-07T23:12:34.285ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30290beb-2668-4cd2-a2e7-72a829d5c955 uri = /v1/system/silos/demo-silo/quotas
172812025-03-07T23:12:34.285ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:372:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:388:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30290beb-2668-4cd2-a2e7-72a829d5c955 uri = /v1/system/silos/demo-silo/quotas
172822025-03-07T23:12:34.285ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 851 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30290beb-2668-4cd2-a2e7-72a829d5c955 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
172832025-03-07T23:12:34.285ZINFOtest_unauthorized (external client test context): client received response status = 401
172842025-03-07T23:12:34.286ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/quotas
172852025-03-07T23:12:34.286ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172862025-03-07T23:12:34.286ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2320dbf8-5169-4edc-ae12-9b3646c4338a uri = /v1/system/silos/demo-silo/quotas
172872025-03-07T23:12:34.287ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2320dbf8-5169-4edc-ae12-9b3646c4338a response_code = 405 uri = /v1/system/silos/demo-silo/quotas
172882025-03-07T23:12:34.287ZINFOtest_unauthorized (external client test context): client received response status = 405
172892025-03-07T23:12:34.287ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/quotas
172902025-03-07T23:12:34.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172912025-03-07T23:12:34.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 98f2efef-2954-4ce2-8b58-7a72c45c649c uri = /v1/system/silos/demo-silo/quotas
172922025-03-07T23:12:34.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 98f2efef-2954-4ce2-8b58-7a72c45c649c response_code = 405 uri = /v1/system/silos/demo-silo/quotas
172932025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client received response status = 405
172942025-03-07T23:12:34.288ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/quotas
172952025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
172962025-03-07T23:12:34.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5aaf3b1c-54af-43fe-ad01-b8f11843a2a6 uri = /v1/system/silos/demo-silo/quotas
172972025-03-07T23:12:34.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5aaf3b1c-54af-43fe-ad01-b8f11843a2a6 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
172982025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client received response status = 405
172992025-03-07T23:12:34.288ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/quotas
173002025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173012025-03-07T23:12:34.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e17df2a-ed40-469e-be08-7841c757b3e8 uri = /v1/system/silos/demo-silo/quotas
173022025-03-07T23:12:34.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4e17df2a-ed40-469e-be08-7841c757b3e8 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173032025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client received response status = 405
173042025-03-07T23:12:34.288ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/quotas
173052025-03-07T23:12:34.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173062025-03-07T23:12:34.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 67f11fab-9d70-4dff-a80d-2df9789db0cc uri = /v1/system/silos/demo-silo/quotas
173072025-03-07T23:12:34.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 67f11fab-9d70-4dff-a80d-2df9789db0cc response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173082025-03-07T23:12:34.289ZINFOtest_unauthorized (external client test context): client received response status = 405
173092025-03-07T23:12:34.289ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/quotas
173102025-03-07T23:12:34.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173112025-03-07T23:12:34.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a21a953-7409-412e-8c00-88bdc17d84c5 uri = /v1/system/silos/demo-silo/quotas
173122025-03-07T23:12:34.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a21a953-7409-412e-8c00-88bdc17d84c5 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173132025-03-07T23:12:34.293ZINFOtest_unauthorized (external client test context): client received response status = 405
173142025-03-07T23:12:34.293ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/quotas
173152025-03-07T23:12:34.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173162025-03-07T23:12:34.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e5651da9-c07c-45af-9179-28e2a0e655e7 uri = /v1/system/silos/demo-silo/quotas
173172025-03-07T23:12:34.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e5651da9-c07c-45af-9179-28e2a0e655e7 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173182025-03-07T23:12:34.293ZINFOtest_unauthorized (external client test context): client received response status = 405
173192025-03-07T23:12:34.293ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/quotas
173202025-03-07T23:12:34.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173212025-03-07T23:12:34.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3a483196-75db-484a-b5e7-033e5988ce43 uri = /v1/system/silos/demo-silo/quotas
173222025-03-07T23:12:34.294ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3a483196-75db-484a-b5e7-033e5988ce43 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173232025-03-07T23:12:34.294ZINFOtest_unauthorized (external client test context): client received response status = 405
173242025-03-07T23:12:34.294ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/quotas
173252025-03-07T23:12:34.294ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173262025-03-07T23:12:34.294ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e5e35c52-c04e-4679-b48c-4ce67b1e08f7 uri = /v1/system/silos/demo-silo/quotas
173272025-03-07T23:12:34.294ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e5e35c52-c04e-4679-b48c-4ce67b1e08f7 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173282025-03-07T23:12:34.294ZINFOtest_unauthorized (external client test context): client received response status = 405
173292025-03-07T23:12:34.295ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/quotas
173302025-03-07T23:12:34.295ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173312025-03-07T23:12:34.302ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b72f457e-c653-480e-981e-d8d16b0b78d8 uri = /v1/system/silos/demo-silo/quotas
173322025-03-07T23:12:34.302ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 232 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b72f457e-c653-480e-981e-d8d16b0b78d8 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173332025-03-07T23:12:34.302ZINFOtest_unauthorized (external client test context): client received response status = 405
173342025-03-07T23:12:34.303ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/quotas
173352025-03-07T23:12:34.303ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173362025-03-07T23:12:34.303ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 27893189-3e84-460c-b0fe-cac7578ddc3a uri = /v1/system/silos/demo-silo/quotas
173372025-03-07T23:12:34.303ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 27893189-3e84-460c-b0fe-cac7578ddc3a response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173382025-03-07T23:12:34.303ZINFOtest_unauthorized (external client test context): client received response status = 405
173392025-03-07T23:12:34.304ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/quotas
173402025-03-07T23:12:34.304ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173412025-03-07T23:12:34.304ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ca9f946c-0342-45e7-8b4a-46a28598327b uri = /v1/system/silos/demo-silo/quotas
173422025-03-07T23:12:34.304ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ca9f946c-0342-45e7-8b4a-46a28598327b response_code = 405 uri = /v1/system/silos/demo-silo/quotas
173432025-03-07T23:12:34.304ZINFOtest_unauthorized (external client test context): client received response status = 405
173442025-03-07T23:12:34.305ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/quotas
173452025-03-07T23:12:34.305ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silos/demo-silo/quotas
173462025-03-07T23:12:34.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 uri = /v1/system/silos/demo-silo/quotas
173472025-03-07T23:12:34.305ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 uri = /v1/system/silos/demo-silo/quotas
173482025-03-07T23:12:34.306ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/quotas
173492025-03-07T23:12:34.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173502025-03-07T23:12:34.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173512025-03-07T23:12:34.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173522025-03-07T23:12:34.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173532025-03-07T23:12:34.309ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173542025-03-07T23:12:34.310ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173552025-03-07T23:12:34.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
173562025-03-07T23:12:34.329ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
173572025-03-07T23:12:34.329ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173582025-03-07T23:12:34.329ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173592025-03-07T23:12:34.329ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173602025-03-07T23:12:34.331ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
173612025-03-07T23:12:34.331ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173622025-03-07T23:12:34.332ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173632025-03-07T23:12:34.332ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173642025-03-07T23:12:34.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
173652025-03-07T23:12:34.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
173662025-03-07T23:12:34.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173672025-03-07T23:12:34.338ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173682025-03-07T23:12:34.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173692025-03-07T23:12:34.340ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
173702025-03-07T23:12:34.342ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
173712025-03-07T23:12:34.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173722025-03-07T23:12:34.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173732025-03-07T23:12:34.342ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173742025-03-07T23:12:34.344ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
173752025-03-07T23:12:34.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173762025-03-07T23:12:34.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173772025-03-07T23:12:34.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173782025-03-07T23:12:34.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
173792025-03-07T23:12:34.359ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
173802025-03-07T23:12:34.361ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 uri = /v1/system/silos/demo-silo/quotas
173812025-03-07T23:12:34.361ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
173822025-03-07T23:12:34.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173832025-03-07T23:12:34.361ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173842025-03-07T23:12:34.373ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
173852025-03-07T23:12:34.373ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
173862025-03-07T23:12:34.373ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
173872025-03-07T23:12:34.373ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173882025-03-07T23:12:34.377ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173892025-03-07T23:12:34.381ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
173902025-03-07T23:12:34.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
173912025-03-07T23:12:34.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173922025-03-07T23:12:34.384ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173932025-03-07T23:12:34.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
173942025-03-07T23:12:34.399ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173952025-03-07T23:12:34.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
173962025-03-07T23:12:34.400ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
173972025-03-07T23:12:34.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
173982025-03-07T23:12:34.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173992025-03-07T23:12:34.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
174002025-03-07T23:12:34.407ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
174012025-03-07T23:12:34.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
174022025-03-07T23:12:34.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
174032025-03-07T23:12:34.409ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
174042025-03-07T23:12:34.412ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
174052025-03-07T23:12:34.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
174062025-03-07T23:12:34.431ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database uri = /v1/system/silos/demo-silo/quotas
174072025-03-07T23:12:34.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
174082025-03-07T23:12:34.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
174092025-03-07T23:12:34.434ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 129357 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0952c8cd-9972-40cc-b989-11850aea7ad5 response_code = 200 uri = /v1/system/silos/demo-silo/quotas
174102025-03-07T23:12:34.435ZINFOtest_unauthorized (external client test context): client received response status = 200
174112025-03-07T23:12:34.435ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silo-quotas
174122025-03-07T23:12:34.436ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silo-quotas
174132025-03-07T23:12:34.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
174142025-03-07T23:12:34.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f uri = /v1/system/silo-quotas
174152025-03-07T23:12:34.437ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f uri = /v1/system/silo-quotas
174162025-03-07T23:12:34.437ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silo-quotas
174172025-03-07T23:12:34.437ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174182025-03-07T23:12:34.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174192025-03-07T23:12:34.438ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174202025-03-07T23:12:34.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174212025-03-07T23:12:34.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174222025-03-07T23:12:34.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174232025-03-07T23:12:34.444ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
174242025-03-07T23:12:34.444ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
174252025-03-07T23:12:34.444ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174262025-03-07T23:12:34.444ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174272025-03-07T23:12:34.445ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174282025-03-07T23:12:34.447ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
174292025-03-07T23:12:34.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174302025-03-07T23:12:34.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174312025-03-07T23:12:34.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174322025-03-07T23:12:34.469ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
174332025-03-07T23:12:34.488ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
174342025-03-07T23:12:34.488ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174352025-03-07T23:12:34.488ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174362025-03-07T23:12:34.489ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174372025-03-07T23:12:34.496ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
174382025-03-07T23:12:34.496ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
174392025-03-07T23:12:34.497ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174402025-03-07T23:12:34.497ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174412025-03-07T23:12:34.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174422025-03-07T23:12:34.501ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
174432025-03-07T23:12:34.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174442025-03-07T23:12:34.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174452025-03-07T23:12:34.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174462025-03-07T23:12:34.503ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
174472025-03-07T23:12:34.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
174482025-03-07T23:12:34.519ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f uri = /v1/system/silo-quotas
174492025-03-07T23:12:34.519ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Fleet uri = /v1/system/silo-quotas
174502025-03-07T23:12:34.520ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
174512025-03-07T23:12:34.520ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Database uri = /v1/system/silo-quotas
174522025-03-07T23:12:34.520ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
174532025-03-07T23:12:34.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Database result = Ok(()) uri = /v1/system/silo-quotas
174542025-03-07T23:12:34.529ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silo-quotas
174552025-03-07T23:12:34.534ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Fleet result = Ok(()) uri = /v1/system/silo-quotas
174562025-03-07T23:12:34.534ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Database uri = /v1/system/silo-quotas
174572025-03-07T23:12:34.534ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
174582025-03-07T23:12:34.547ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f resource = Database result = Ok(()) uri = /v1/system/silo-quotas
174592025-03-07T23:12:34.555ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 118416 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4c88e8ba-7932-4b69-b3ae-7890cae4da5f response_code = 200 uri = /v1/system/silo-quotas
174602025-03-07T23:12:34.555ZINFOtest_unauthorized (external client test context): client received response status = 200
174612025-03-07T23:12:34.556ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silo-quotas
174622025-03-07T23:12:34.556ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
174632025-03-07T23:12:34.556ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 uri = /v1/system/silo-quotas
174642025-03-07T23:12:34.556ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 uri = /v1/system/silo-quotas
174652025-03-07T23:12:34.556ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silo-quotas
174662025-03-07T23:12:34.556ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174672025-03-07T23:12:34.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174682025-03-07T23:12:34.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174692025-03-07T23:12:34.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174702025-03-07T23:12:34.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174712025-03-07T23:12:34.561ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174722025-03-07T23:12:34.564ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
174732025-03-07T23:12:34.564ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
174742025-03-07T23:12:34.564ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174752025-03-07T23:12:34.564ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174762025-03-07T23:12:34.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174772025-03-07T23:12:34.567ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
174782025-03-07T23:12:34.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174792025-03-07T23:12:34.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174802025-03-07T23:12:34.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174812025-03-07T23:12:34.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
174822025-03-07T23:12:34.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
174832025-03-07T23:12:34.594ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174842025-03-07T23:12:34.594ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174852025-03-07T23:12:34.594ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174862025-03-07T23:12:34.600ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
174872025-03-07T23:12:34.601ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
174882025-03-07T23:12:34.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
174892025-03-07T23:12:34.601ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
174902025-03-07T23:12:34.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174912025-03-07T23:12:34.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174922025-03-07T23:12:34.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174932025-03-07T23:12:34.607ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
174942025-03-07T23:12:34.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
174952025-03-07T23:12:34.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
174962025-03-07T23:12:34.609ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
174972025-03-07T23:12:34.612ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
174982025-03-07T23:12:34.618ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
174992025-03-07T23:12:34.618ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
175002025-03-07T23:12:34.618ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
175012025-03-07T23:12:34.618ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
175022025-03-07T23:12:34.640ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
175032025-03-07T23:12:34.641ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 uri = /v1/system/silo-quotas
175042025-03-07T23:12:34.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 resource = Fleet uri = /v1/system/silo-quotas
175052025-03-07T23:12:34.642ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
175062025-03-07T23:12:34.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 resource = Database uri = /v1/system/silo-quotas
175072025-03-07T23:12:34.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
175082025-03-07T23:12:34.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 resource = Database result = Ok(()) uri = /v1/system/silo-quotas
175092025-03-07T23:12:34.644ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
175102025-03-07T23:12:34.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 resource = Fleet result = Err(Forbidden) uri = /v1/system/silo-quotas
175112025-03-07T23:12:34.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 97387 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 86b73baf-d7c8-4226-9d11-d5ea85070cf7 response_code = 403 uri = /v1/system/silo-quotas
175122025-03-07T23:12:34.654ZINFOtest_unauthorized (external client test context): client received response status = 403
175132025-03-07T23:12:34.654ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silo-quotas
175142025-03-07T23:12:34.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
175152025-03-07T23:12:34.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b uri = /v1/system/silo-quotas
175162025-03-07T23:12:34.656ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b uri = /v1/system/silo-quotas
175172025-03-07T23:12:34.656ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b uri = /v1/system/silo-quotas
175182025-03-07T23:12:34.656ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b uri = /v1/system/silo-quotas
175192025-03-07T23:12:34.656ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b resource = Fleet uri = /v1/system/silo-quotas
175202025-03-07T23:12:34.656ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
175212025-03-07T23:12:34.656ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silo-quotas
175222025-03-07T23:12:34.656ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 907 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 262ef672-5181-4cf6-9117-6c657879555b response_code = 401 uri = /v1/system/silo-quotas
175232025-03-07T23:12:34.656ZINFOtest_unauthorized (external client test context): client received response status = 401
175242025-03-07T23:12:34.657ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silo-quotas
175252025-03-07T23:12:34.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
175262025-03-07T23:12:34.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14059d00-02d1-4f5e-8b8e-8aa3cb87dfe8 uri = /v1/system/silo-quotas
175272025-03-07T23:12:34.657ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14059d00-02d1-4f5e-8b8e-8aa3cb87dfe8 uri = /v1/system/silo-quotas
175282025-03-07T23:12:34.657ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14059d00-02d1-4f5e-8b8e-8aa3cb87dfe8 uri = /v1/system/silo-quotas
175292025-03-07T23:12:34.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 182 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14059d00-02d1-4f5e-8b8e-8aa3cb87dfe8 response_code = 401 uri = /v1/system/silo-quotas
175302025-03-07T23:12:34.657ZINFOtest_unauthorized (external client test context): client received response status = 401
175312025-03-07T23:12:34.657ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silo-quotas
175322025-03-07T23:12:34.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
175332025-03-07T23:12:34.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3e5bf14-eae3-4d59-8f7d-dd7fc6b43f53 uri = /v1/system/silo-quotas
175342025-03-07T23:12:34.659ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3e5bf14-eae3-4d59-8f7d-dd7fc6b43f53 uri = /v1/system/silo-quotas
175352025-03-07T23:12:34.659ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:319:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:337:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3e5bf14-eae3-4d59-8f7d-dd7fc6b43f53 uri = /v1/system/silo-quotas
175362025-03-07T23:12:34.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 867 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3e5bf14-eae3-4d59-8f7d-dd7fc6b43f53 response_code = 401 uri = /v1/system/silo-quotas
175372025-03-07T23:12:34.659ZINFOtest_unauthorized (external client test context): client received response status = 401
175382025-03-07T23:12:34.659ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silo-quotas
175392025-03-07T23:12:34.659ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silo-quotas
175402025-03-07T23:12:34.659ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c9e73261-0f22-4079-86e1-5cafd2eba76a uri = /v1/system/silo-quotas
175412025-03-07T23:12:34.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 411 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c9e73261-0f22-4079-86e1-5cafd2eba76a response_code = 405 uri = /v1/system/silo-quotas
175422025-03-07T23:12:34.660ZINFOtest_unauthorized (external client test context): client received response status = 405
175432025-03-07T23:12:34.660ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silo-quotas
175442025-03-07T23:12:34.660ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silo-quotas
175452025-03-07T23:12:34.660ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4599fe29-8495-4df7-b9dd-194f8ac6bfad uri = /v1/system/silo-quotas
175462025-03-07T23:12:34.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4599fe29-8495-4df7-b9dd-194f8ac6bfad response_code = 405 uri = /v1/system/silo-quotas
175472025-03-07T23:12:34.661ZINFOtest_unauthorized (external client test context): client received response status = 405
175482025-03-07T23:12:34.661ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silo-quotas
175492025-03-07T23:12:34.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silo-quotas
175502025-03-07T23:12:34.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cd30e8c3-b399-4315-b61f-1a9471aa01ad uri = /v1/system/silo-quotas
175512025-03-07T23:12:34.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cd30e8c3-b399-4315-b61f-1a9471aa01ad response_code = 405 uri = /v1/system/silo-quotas
175522025-03-07T23:12:34.662ZINFOtest_unauthorized (external client test context): client received response status = 405
175532025-03-07T23:12:34.662ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silo-quotas
175542025-03-07T23:12:34.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/silo-quotas
175552025-03-07T23:12:34.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4a8e2999-c7eb-4ef5-bc75-31d8d6379aae uri = /v1/system/silo-quotas
175562025-03-07T23:12:34.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4a8e2999-c7eb-4ef5-bc75-31d8d6379aae response_code = 405 uri = /v1/system/silo-quotas
175572025-03-07T23:12:34.662ZINFOtest_unauthorized (external client test context): client received response status = 405
175582025-03-07T23:12:34.662ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silo-quotas
175592025-03-07T23:12:34.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silo-quotas
175602025-03-07T23:12:34.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a5eb1c40-8018-4406-b6c2-1fc607ad8c0e uri = /v1/system/silo-quotas
175612025-03-07T23:12:34.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a5eb1c40-8018-4406-b6c2-1fc607ad8c0e response_code = 405 uri = /v1/system/silo-quotas
175622025-03-07T23:12:34.662ZINFOtest_unauthorized (external client test context): client received response status = 405
175632025-03-07T23:12:34.662ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silo-quotas
175642025-03-07T23:12:34.664ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silo-quotas
175652025-03-07T23:12:34.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c8425ab2-f25a-4fd1-b035-1eff70d9f988 uri = /v1/system/silo-quotas
175662025-03-07T23:12:34.664ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c8425ab2-f25a-4fd1-b035-1eff70d9f988 response_code = 405 uri = /v1/system/silo-quotas
175672025-03-07T23:12:34.664ZINFOtest_unauthorized (external client test context): client received response status = 405
175682025-03-07T23:12:34.664ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silo-quotas
175692025-03-07T23:12:34.664ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silo-quotas
175702025-03-07T23:12:34.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 10c46be5-4db6-4c94-9123-22b06c942cd2 uri = /v1/system/silo-quotas
175712025-03-07T23:12:34.664ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 10c46be5-4db6-4c94-9123-22b06c942cd2 response_code = 405 uri = /v1/system/silo-quotas
175722025-03-07T23:12:34.665ZINFOtest_unauthorized (external client test context): client received response status = 405
175732025-03-07T23:12:34.665ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silo-quotas
175742025-03-07T23:12:34.665ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/silo-quotas
175752025-03-07T23:12:34.665ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9aa9c16a-c8cf-4274-ad6c-f818eddb2c7e uri = /v1/system/silo-quotas
175762025-03-07T23:12:34.665ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9aa9c16a-c8cf-4274-ad6c-f818eddb2c7e response_code = 405 uri = /v1/system/silo-quotas
175772025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client received response status = 405
175782025-03-07T23:12:34.666ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silo-quotas
175792025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silo-quotas
175802025-03-07T23:12:34.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3ecae42-6fa4-4bae-a620-a1c4b1e20dc7 uri = /v1/system/silo-quotas
175812025-03-07T23:12:34.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3ecae42-6fa4-4bae-a620-a1c4b1e20dc7 response_code = 405 uri = /v1/system/silo-quotas
175822025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client received response status = 405
175832025-03-07T23:12:34.666ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silo-quotas
175842025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silo-quotas
175852025-03-07T23:12:34.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e970d9d1-cb06-4624-9d63-694aa8bfebbe uri = /v1/system/silo-quotas
175862025-03-07T23:12:34.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e970d9d1-cb06-4624-9d63-694aa8bfebbe response_code = 405 uri = /v1/system/silo-quotas
175872025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client received response status = 405
175882025-03-07T23:12:34.666ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silo-quotas
175892025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silo-quotas
175902025-03-07T23:12:34.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dbfda49a-af26-48ee-92e5-27caf4d637e4 uri = /v1/system/silo-quotas
175912025-03-07T23:12:34.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dbfda49a-af26-48ee-92e5-27caf4d637e4 response_code = 405 uri = /v1/system/silo-quotas
175922025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client received response status = 405
175932025-03-07T23:12:34.666ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silo-quotas
175942025-03-07T23:12:34.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/silo-quotas
175952025-03-07T23:12:34.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 499fe071-c681-43a5-a2ba-06126a112a40 uri = /v1/system/silo-quotas
175962025-03-07T23:12:34.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 499fe071-c681-43a5-a2ba-06126a112a40 response_code = 405 uri = /v1/system/silo-quotas
175972025-03-07T23:12:34.667ZINFOtest_unauthorized (external client test context): client received response status = 405
175982025-03-07T23:12:34.667ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silo-quotas
175992025-03-07T23:12:34.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silo-quotas
176002025-03-07T23:12:34.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 12da45f7-cb2b-4887-a165-d5ce4e80c6ce uri = /v1/system/silo-quotas
176012025-03-07T23:12:34.668ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 12da45f7-cb2b-4887-a165-d5ce4e80c6ce response_code = 405 uri = /v1/system/silo-quotas
176022025-03-07T23:12:34.668ZINFOtest_unauthorized (external client test context): client received response status = 405
176032025-03-07T23:12:34.668ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silo-quotas
176042025-03-07T23:12:34.668ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silo-quotas
176052025-03-07T23:12:34.668ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cdd520f4-56bd-4893-89aa-8d315836ccd7 uri = /v1/system/silo-quotas
176062025-03-07T23:12:34.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cdd520f4-56bd-4893-89aa-8d315836ccd7 response_code = 405 uri = /v1/system/silo-quotas
176072025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client received response status = 405
176082025-03-07T23:12:34.669ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silo-quotas
176092025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silo-quotas
176102025-03-07T23:12:34.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c563ff4-78c9-4de3-8a1f-4356ea5c7c63 uri = /v1/system/silo-quotas
176112025-03-07T23:12:34.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c563ff4-78c9-4de3-8a1f-4356ea5c7c63 response_code = 405 uri = /v1/system/silo-quotas
176122025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client received response status = 405
176132025-03-07T23:12:34.669ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silo-quotas
176142025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/silo-quotas
176152025-03-07T23:12:34.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8ee8669e-789b-4424-b25a-c0808cbdf9c5 uri = /v1/system/silo-quotas
176162025-03-07T23:12:34.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8ee8669e-789b-4424-b25a-c0808cbdf9c5 response_code = 405 uri = /v1/system/silo-quotas
176172025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client received response status = 405
176182025-03-07T23:12:34.669ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silo-quotas
176192025-03-07T23:12:34.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/silo-quotas
176202025-03-07T23:12:34.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb uri = /v1/system/silo-quotas
176212025-03-07T23:12:34.670ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb uri = /v1/system/silo-quotas
176222025-03-07T23:12:34.670ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silo-quotas
176232025-03-07T23:12:34.670ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176242025-03-07T23:12:34.670ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176252025-03-07T23:12:34.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176262025-03-07T23:12:34.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176272025-03-07T23:12:34.709ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176282025-03-07T23:12:34.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176292025-03-07T23:12:34.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
176302025-03-07T23:12:34.712ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176312025-03-07T23:12:34.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176322025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176332025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176342025-03-07T23:12:34.725ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176352025-03-07T23:12:34.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176362025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176372025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176382025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176392025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
176402025-03-07T23:12:34.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176412025-03-07T23:12:34.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176422025-03-07T23:12:34.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176432025-03-07T23:12:34.726ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
176442025-03-07T23:12:34.726ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176452025-03-07T23:12:34.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176462025-03-07T23:12:34.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176472025-03-07T23:12:34.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176482025-03-07T23:12:34.742ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176492025-03-07T23:12:34.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176502025-03-07T23:12:34.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176512025-03-07T23:12:34.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176522025-03-07T23:12:34.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176532025-03-07T23:12:34.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
176542025-03-07T23:12:34.754ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb uri = /v1/system/silo-quotas
176552025-03-07T23:12:34.754ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Fleet uri = /v1/system/silo-quotas
176562025-03-07T23:12:34.754ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
176572025-03-07T23:12:34.754ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Database uri = /v1/system/silo-quotas
176582025-03-07T23:12:34.754ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176592025-03-07T23:12:34.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Database result = Ok(()) uri = /v1/system/silo-quotas
176602025-03-07T23:12:34.759ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silo-quotas
176612025-03-07T23:12:34.771ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Fleet result = Ok(()) uri = /v1/system/silo-quotas
176622025-03-07T23:12:34.771ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Database uri = /v1/system/silo-quotas
176632025-03-07T23:12:34.772ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176642025-03-07T23:12:34.772ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb resource = Database result = Ok(()) uri = /v1/system/silo-quotas
176652025-03-07T23:12:34.776ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 107042 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cc224bf7-79bc-4f75-a814-cde4018c6dfb response_code = 200 uri = /v1/system/silo-quotas
176662025-03-07T23:12:34.788ZINFOtest_unauthorized (external client test context): client received response status = 200
176672025-03-07T23:12:34.788ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/utilization/silos
176682025-03-07T23:12:34.788ZINFOtest_unauthorized: test: privileged GET url = /v1/system/utilization/silos
176692025-03-07T23:12:34.788ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
176702025-03-07T23:12:34.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 uri = /v1/system/utilization/silos
176712025-03-07T23:12:34.793ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 uri = /v1/system/utilization/silos
176722025-03-07T23:12:34.793ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos
176732025-03-07T23:12:34.793ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176742025-03-07T23:12:34.794ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176752025-03-07T23:12:34.796ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176762025-03-07T23:12:34.821ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176772025-03-07T23:12:34.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176782025-03-07T23:12:34.836ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176792025-03-07T23:12:34.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
176802025-03-07T23:12:34.846ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176812025-03-07T23:12:34.846ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176822025-03-07T23:12:34.846ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176832025-03-07T23:12:34.856ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176842025-03-07T23:12:34.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176852025-03-07T23:12:34.864ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176862025-03-07T23:12:34.864ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176872025-03-07T23:12:34.865ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176882025-03-07T23:12:34.874ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176892025-03-07T23:12:34.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
176902025-03-07T23:12:34.883ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176912025-03-07T23:12:34.883ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176922025-03-07T23:12:34.884ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176932025-03-07T23:12:34.902ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
176942025-03-07T23:12:34.909ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176952025-03-07T23:12:34.910ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176962025-03-07T23:12:34.910ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176972025-03-07T23:12:34.917ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176982025-03-07T23:12:34.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176992025-03-07T23:12:34.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177002025-03-07T23:12:34.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177012025-03-07T23:12:34.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177022025-03-07T23:12:34.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
177032025-03-07T23:12:34.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
177042025-03-07T23:12:34.977ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 uri = /v1/system/utilization/silos
177052025-03-07T23:12:34.978ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Fleet uri = /v1/system/utilization/silos
177062025-03-07T23:12:34.978ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
177072025-03-07T23:12:34.978ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Database uri = /v1/system/utilization/silos
177082025-03-07T23:12:34.978ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
177092025-03-07T23:12:34.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
177102025-03-07T23:12:34.983ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos
177112025-03-07T23:12:35.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Fleet result = Ok(()) uri = /v1/system/utilization/silos
177122025-03-07T23:12:35.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Database uri = /v1/system/utilization/silos
177132025-03-07T23:12:35.015ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
177142025-03-07T23:12:35.017ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
177152025-03-07T23:12:35.030ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 238096 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72003a18-37dc-40a4-9c75-b2c1fe05db39 response_code = 200 uri = /v1/system/utilization/silos
177162025-03-07T23:12:35.031ZINFOtest_unauthorized (external client test context): client received response status = 200
177172025-03-07T23:12:35.031ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/utilization/silos
177182025-03-07T23:12:35.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
177192025-03-07T23:12:35.056ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e uri = /v1/system/utilization/silos
177202025-03-07T23:12:35.058ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e uri = /v1/system/utilization/silos
177212025-03-07T23:12:35.058ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/utilization/silos
177222025-03-07T23:12:35.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177232025-03-07T23:12:35.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177242025-03-07T23:12:35.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177252025-03-07T23:12:35.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177262025-03-07T23:12:35.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177272025-03-07T23:12:35.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177282025-03-07T23:12:35.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
177292025-03-07T23:12:35.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
177302025-03-07T23:12:35.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177312025-03-07T23:12:35.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177322025-03-07T23:12:35.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177332025-03-07T23:12:35.086ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
177342025-03-07T23:12:35.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177352025-03-07T23:12:35.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177362025-03-07T23:12:35.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177372025-03-07T23:12:35.089ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
177382025-03-07T23:12:35.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
177392025-03-07T23:12:35.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177402025-03-07T23:12:35.117ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177412025-03-07T23:12:35.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177422025-03-07T23:12:35.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
177432025-03-07T23:12:35.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
177442025-03-07T23:12:35.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177452025-03-07T23:12:35.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177462025-03-07T23:12:35.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177472025-03-07T23:12:35.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
177482025-03-07T23:12:35.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177492025-03-07T23:12:35.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177502025-03-07T23:12:35.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177512025-03-07T23:12:35.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
177522025-03-07T23:12:35.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
177532025-03-07T23:12:35.148ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e uri = /v1/system/utilization/silos
177542025-03-07T23:12:35.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e resource = Fleet uri = /v1/system/utilization/silos
177552025-03-07T23:12:35.149ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
177562025-03-07T23:12:35.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e resource = Database uri = /v1/system/utilization/silos
177572025-03-07T23:12:35.149ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
177582025-03-07T23:12:35.150ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e resource = Database result = Ok(()) uri = /v1/system/utilization/silos
177592025-03-07T23:12:35.153ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
177602025-03-07T23:12:35.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e resource = Fleet result = Err(Forbidden) uri = /v1/system/utilization/silos
177612025-03-07T23:12:35.174ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 118630 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04271653-d223-426e-9a65-02482d06af6e response_code = 403 uri = /v1/system/utilization/silos
177622025-03-07T23:12:35.184ZINFOtest_unauthorized (external client test context): client received response status = 403
177632025-03-07T23:12:35.184ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/utilization/silos
177642025-03-07T23:12:35.184ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
177652025-03-07T23:12:35.185ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 uri = /v1/system/utilization/silos
177662025-03-07T23:12:35.186ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 uri = /v1/system/utilization/silos
177672025-03-07T23:12:35.186ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 uri = /v1/system/utilization/silos
177682025-03-07T23:12:35.186ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 uri = /v1/system/utilization/silos
177692025-03-07T23:12:35.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 resource = Fleet uri = /v1/system/utilization/silos
177702025-03-07T23:12:35.186ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
177712025-03-07T23:12:35.186ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/utilization/silos
177722025-03-07T23:12:35.187ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1753 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89fe07b4-9ec5-47ab-adb0-1ed19c466547 response_code = 401 uri = /v1/system/utilization/silos
177732025-03-07T23:12:35.191ZINFOtest_unauthorized (external client test context): client received response status = 401
177742025-03-07T23:12:35.191ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/utilization/silos
177752025-03-07T23:12:35.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
177762025-03-07T23:12:35.191ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d7551f8e-6261-4696-ad8c-4fdb50c5b6ea uri = /v1/system/utilization/silos
177772025-03-07T23:12:35.191ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d7551f8e-6261-4696-ad8c-4fdb50c5b6ea uri = /v1/system/utilization/silos
177782025-03-07T23:12:35.191ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d7551f8e-6261-4696-ad8c-4fdb50c5b6ea uri = /v1/system/utilization/silos
177792025-03-07T23:12:35.191ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 189 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d7551f8e-6261-4696-ad8c-4fdb50c5b6ea response_code = 401 uri = /v1/system/utilization/silos
177802025-03-07T23:12:35.191ZINFOtest_unauthorized (external client test context): client received response status = 401
177812025-03-07T23:12:35.191ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/utilization/silos
177822025-03-07T23:12:35.192ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
177832025-03-07T23:12:35.192ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0a9a011c-3df1-44ac-8665-5dc14dc65133 uri = /v1/system/utilization/silos
177842025-03-07T23:12:35.192ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0a9a011c-3df1-44ac-8665-5dc14dc65133 uri = /v1/system/utilization/silos
177852025-03-07T23:12:35.192ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:286:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:304:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0a9a011c-3df1-44ac-8665-5dc14dc65133 uri = /v1/system/utilization/silos
177862025-03-07T23:12:35.192ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 986 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0a9a011c-3df1-44ac-8665-5dc14dc65133 response_code = 401 uri = /v1/system/utilization/silos
177872025-03-07T23:12:35.192ZINFOtest_unauthorized (external client test context): client received response status = 401
177882025-03-07T23:12:35.192ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/utilization/silos
177892025-03-07T23:12:35.192ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos
177902025-03-07T23:12:35.192ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7122e0f7-9b5d-4984-bd68-608dd4a05add uri = /v1/system/utilization/silos
177912025-03-07T23:12:35.192ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7122e0f7-9b5d-4984-bd68-608dd4a05add response_code = 405 uri = /v1/system/utilization/silos
177922025-03-07T23:12:35.192ZINFOtest_unauthorized (external client test context): client received response status = 405
177932025-03-07T23:12:35.192ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/utilization/silos
177942025-03-07T23:12:35.192ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos
177952025-03-07T23:12:35.193ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c8f0edc5-0f99-4315-99c8-77da22088666 uri = /v1/system/utilization/silos
177962025-03-07T23:12:35.193ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c8f0edc5-0f99-4315-99c8-77da22088666 response_code = 405 uri = /v1/system/utilization/silos
177972025-03-07T23:12:35.193ZINFOtest_unauthorized (external client test context): client received response status = 405
177982025-03-07T23:12:35.193ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/utilization/silos
177992025-03-07T23:12:35.193ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos
178002025-03-07T23:12:35.193ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0df3f60c-cfaf-4866-a4e9-a6c23cc02a49 uri = /v1/system/utilization/silos
178012025-03-07T23:12:35.193ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 239 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0df3f60c-cfaf-4866-a4e9-a6c23cc02a49 response_code = 405 uri = /v1/system/utilization/silos
178022025-03-07T23:12:35.194ZINFOtest_unauthorized (external client test context): client received response status = 405
178032025-03-07T23:12:35.194ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/utilization/silos
178042025-03-07T23:12:35.195ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos
178052025-03-07T23:12:35.195ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 065ddd26-3d7e-43ca-9633-fe8c72f58b39 uri = /v1/system/utilization/silos
178062025-03-07T23:12:35.195ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 065ddd26-3d7e-43ca-9633-fe8c72f58b39 response_code = 405 uri = /v1/system/utilization/silos
178072025-03-07T23:12:35.195ZINFOtest_unauthorized (external client test context): client received response status = 405
178082025-03-07T23:12:35.195ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/utilization/silos
178092025-03-07T23:12:35.195ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos
178102025-03-07T23:12:35.195ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72c8e88d-19f5-4a22-b092-2defaeb66be8 uri = /v1/system/utilization/silos
178112025-03-07T23:12:35.196ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 458 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72c8e88d-19f5-4a22-b092-2defaeb66be8 response_code = 405 uri = /v1/system/utilization/silos
178122025-03-07T23:12:35.196ZINFOtest_unauthorized (external client test context): client received response status = 405
178132025-03-07T23:12:35.196ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/utilization/silos
178142025-03-07T23:12:35.196ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos
178152025-03-07T23:12:35.197ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2939dfa-717a-4dae-a7ee-9c1c3fa8a9c8 uri = /v1/system/utilization/silos
178162025-03-07T23:12:35.197ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 174 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2939dfa-717a-4dae-a7ee-9c1c3fa8a9c8 response_code = 405 uri = /v1/system/utilization/silos
178172025-03-07T23:12:35.197ZINFOtest_unauthorized (external client test context): client received response status = 405
178182025-03-07T23:12:35.199ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/utilization/silos
178192025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos
178202025-03-07T23:12:35.199ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8dc78be2-47ea-42bf-8b9b-dbd485304a19 uri = /v1/system/utilization/silos
178212025-03-07T23:12:35.199ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8dc78be2-47ea-42bf-8b9b-dbd485304a19 response_code = 405 uri = /v1/system/utilization/silos
178222025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client received response status = 405
178232025-03-07T23:12:35.199ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/utilization/silos
178242025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos
178252025-03-07T23:12:35.199ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e0fe4045-435c-4d19-a948-39655ad7ea73 uri = /v1/system/utilization/silos
178262025-03-07T23:12:35.199ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e0fe4045-435c-4d19-a948-39655ad7ea73 response_code = 405 uri = /v1/system/utilization/silos
178272025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client received response status = 405
178282025-03-07T23:12:35.199ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/utilization/silos
178292025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178302025-03-07T23:12:35.199ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = aa8ab016-f848-4901-9e9f-22e33ab5af71 uri = /v1/system/utilization/silos
178312025-03-07T23:12:35.199ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = aa8ab016-f848-4901-9e9f-22e33ab5af71 response_code = 405 uri = /v1/system/utilization/silos
178322025-03-07T23:12:35.199ZINFOtest_unauthorized (external client test context): client received response status = 405
178332025-03-07T23:12:35.200ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/utilization/silos
178342025-03-07T23:12:35.200ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178352025-03-07T23:12:35.200ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 90d5fa9f-6da5-4882-b1b8-efe32d3b66f1 uri = /v1/system/utilization/silos
178362025-03-07T23:12:35.200ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 90d5fa9f-6da5-4882-b1b8-efe32d3b66f1 response_code = 405 uri = /v1/system/utilization/silos
178372025-03-07T23:12:35.200ZINFOtest_unauthorized (external client test context): client received response status = 405
178382025-03-07T23:12:35.201ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/utilization/silos
178392025-03-07T23:12:35.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178402025-03-07T23:12:35.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bee12c26-2cd3-4e44-a83d-07efd9d2fc08 uri = /v1/system/utilization/silos
178412025-03-07T23:12:35.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 164 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bee12c26-2cd3-4e44-a83d-07efd9d2fc08 response_code = 405 uri = /v1/system/utilization/silos
178422025-03-07T23:12:35.201ZINFOtest_unauthorized (external client test context): client received response status = 405
178432025-03-07T23:12:35.202ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/utilization/silos
178442025-03-07T23:12:35.203ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178452025-03-07T23:12:35.203ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 94818234-bed5-45c3-93c8-5f7c9632cd16 uri = /v1/system/utilization/silos
178462025-03-07T23:12:35.203ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 94818234-bed5-45c3-93c8-5f7c9632cd16 response_code = 405 uri = /v1/system/utilization/silos
178472025-03-07T23:12:35.203ZINFOtest_unauthorized (external client test context): client received response status = 405
178482025-03-07T23:12:35.203ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/utilization/silos
178492025-03-07T23:12:35.203ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178502025-03-07T23:12:35.203ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d582bfdd-59ac-4e27-a531-385ec1fa29ed uri = /v1/system/utilization/silos
178512025-03-07T23:12:35.203ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d582bfdd-59ac-4e27-a531-385ec1fa29ed response_code = 405 uri = /v1/system/utilization/silos
178522025-03-07T23:12:35.203ZINFOtest_unauthorized (external client test context): client received response status = 405
178532025-03-07T23:12:35.203ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/utilization/silos
178542025-03-07T23:12:35.204ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178552025-03-07T23:12:35.204ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 91ab2acc-65b5-44bc-9e00-59256791d761 uri = /v1/system/utilization/silos
178562025-03-07T23:12:35.204ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 176 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 91ab2acc-65b5-44bc-9e00-59256791d761 response_code = 405 uri = /v1/system/utilization/silos
178572025-03-07T23:12:35.204ZINFOtest_unauthorized (external client test context): client received response status = 405
178582025-03-07T23:12:35.205ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/utilization/silos
178592025-03-07T23:12:35.206ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178602025-03-07T23:12:35.206ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f7673c92-4b7b-4ebe-93c5-668c1cdbc9bd uri = /v1/system/utilization/silos
178612025-03-07T23:12:35.206ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f7673c92-4b7b-4ebe-93c5-668c1cdbc9bd response_code = 405 uri = /v1/system/utilization/silos
178622025-03-07T23:12:35.206ZINFOtest_unauthorized (external client test context): client received response status = 405
178632025-03-07T23:12:35.206ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/utilization/silos
178642025-03-07T23:12:35.206ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos
178652025-03-07T23:12:35.206ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5a9a31ba-9dc5-40f6-9bfd-521c15894b2e uri = /v1/system/utilization/silos
178662025-03-07T23:12:35.207ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 187 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5a9a31ba-9dc5-40f6-9bfd-521c15894b2e response_code = 405 uri = /v1/system/utilization/silos
178672025-03-07T23:12:35.207ZINFOtest_unauthorized (external client test context): client received response status = 405
178682025-03-07T23:12:35.207ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/utilization/silos
178692025-03-07T23:12:35.207ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos
178702025-03-07T23:12:35.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b uri = /v1/system/utilization/silos
178712025-03-07T23:12:35.209ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b uri = /v1/system/utilization/silos
178722025-03-07T23:12:35.209ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos
178732025-03-07T23:12:35.209ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178742025-03-07T23:12:35.209ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178752025-03-07T23:12:35.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178762025-03-07T23:12:35.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178772025-03-07T23:12:35.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178782025-03-07T23:12:35.217ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178792025-03-07T23:12:35.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
178802025-03-07T23:12:35.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
178812025-03-07T23:12:35.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
178822025-03-07T23:12:35.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
178832025-03-07T23:12:35.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
178842025-03-07T23:12:35.223ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
178852025-03-07T23:12:35.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178862025-03-07T23:12:35.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178872025-03-07T23:12:35.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178882025-03-07T23:12:35.226ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
178892025-03-07T23:12:35.237ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
178902025-03-07T23:12:35.238ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
178912025-03-07T23:12:35.238ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178922025-03-07T23:12:35.238ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178932025-03-07T23:12:35.238ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178942025-03-07T23:12:35.238ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
178952025-03-07T23:12:35.240ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
178962025-03-07T23:12:35.241ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178972025-03-07T23:12:35.241ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178982025-03-07T23:12:35.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178992025-03-07T23:12:35.250ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
179002025-03-07T23:12:35.251ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
179012025-03-07T23:12:35.251ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
179022025-03-07T23:12:35.252ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
179032025-03-07T23:12:35.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179042025-03-07T23:12:35.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179052025-03-07T23:12:35.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179062025-03-07T23:12:35.265ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
179072025-03-07T23:12:35.266ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179082025-03-07T23:12:35.266ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179092025-03-07T23:12:35.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179102025-03-07T23:12:35.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
179112025-03-07T23:12:35.274ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
179122025-03-07T23:12:35.275ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b uri = /v1/system/utilization/silos
179132025-03-07T23:12:35.275ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Fleet uri = /v1/system/utilization/silos
179142025-03-07T23:12:35.275ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
179152025-03-07T23:12:35.277ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Database uri = /v1/system/utilization/silos
179162025-03-07T23:12:35.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
179172025-03-07T23:12:35.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Database result = Ok(()) uri = /v1/system/utilization/silos
179182025-03-07T23:12:35.289ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos
179192025-03-07T23:12:35.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Fleet result = Ok(()) uri = /v1/system/utilization/silos
179202025-03-07T23:12:35.316ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Database uri = /v1/system/utilization/silos
179212025-03-07T23:12:35.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
179222025-03-07T23:12:35.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b resource = Database result = Ok(()) uri = /v1/system/utilization/silos
179232025-03-07T23:12:35.334ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
179242025-03-07T23:12:35.339ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 131641 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a2171ade-f78c-4b8d-8050-5ae59ffe156b response_code = 200 uri = /v1/system/utilization/silos
179252025-03-07T23:12:35.340ZINFOtest_unauthorized (external client test context): client received response status = 200
179262025-03-07T23:12:35.342ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/utilization/silos/demo-silo
179272025-03-07T23:12:35.342ZINFOtest_unauthorized: test: privileged GET url = /v1/system/utilization/silos/demo-silo
179282025-03-07T23:12:35.342ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
179292025-03-07T23:12:35.342ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb uri = /v1/system/utilization/silos/demo-silo
179302025-03-07T23:12:35.342ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb uri = /v1/system/utilization/silos/demo-silo
179312025-03-07T23:12:35.342ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos/demo-silo
179322025-03-07T23:12:35.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179332025-03-07T23:12:35.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179342025-03-07T23:12:35.343ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179352025-03-07T23:12:35.345ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179362025-03-07T23:12:35.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179372025-03-07T23:12:35.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179382025-03-07T23:12:35.356ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
179392025-03-07T23:12:35.357ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
179402025-03-07T23:12:35.365ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179412025-03-07T23:12:35.366ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179422025-03-07T23:12:35.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179432025-03-07T23:12:35.371ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
179442025-03-07T23:12:35.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179452025-03-07T23:12:35.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179462025-03-07T23:12:35.373ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179472025-03-07T23:12:35.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
179482025-03-07T23:12:35.395ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
179492025-03-07T23:12:35.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179502025-03-07T23:12:35.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179512025-03-07T23:12:35.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179522025-03-07T23:12:35.449ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
179532025-03-07T23:12:35.450ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
179542025-03-07T23:12:35.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179552025-03-07T23:12:35.450ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179562025-03-07T23:12:35.452ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179572025-03-07T23:12:35.455ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
179582025-03-07T23:12:35.455ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179592025-03-07T23:12:35.455ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179602025-03-07T23:12:35.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179612025-03-07T23:12:35.461ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
179622025-03-07T23:12:35.487ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
179632025-03-07T23:12:35.498ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb uri = /v1/system/utilization/silos/demo-silo
179642025-03-07T23:12:35.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179652025-03-07T23:12:35.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179662025-03-07T23:12:35.503ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179672025-03-07T23:12:35.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
179682025-03-07T23:12:35.508ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
179692025-03-07T23:12:35.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179702025-03-07T23:12:35.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179712025-03-07T23:12:35.511ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179722025-03-07T23:12:35.521ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
179732025-03-07T23:12:35.522ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179742025-03-07T23:12:35.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179752025-03-07T23:12:35.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179762025-03-07T23:12:35.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
179772025-03-07T23:12:35.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179782025-03-07T23:12:35.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
179792025-03-07T23:12:35.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
179802025-03-07T23:12:35.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179812025-03-07T23:12:35.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179822025-03-07T23:12:35.550ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179832025-03-07T23:12:35.556ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
179842025-03-07T23:12:35.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179852025-03-07T23:12:35.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179862025-03-07T23:12:35.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179872025-03-07T23:12:35.557ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
179882025-03-07T23:12:35.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179892025-03-07T23:12:35.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database uri = /v1/system/utilization/silos/demo-silo
179902025-03-07T23:12:35.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
179912025-03-07T23:12:35.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
179922025-03-07T23:12:35.611ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 269776 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cba91584-18a6-4d7f-859a-c6549b6df5fb response_code = 200 uri = /v1/system/utilization/silos/demo-silo
179932025-03-07T23:12:35.612ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
179942025-03-07T23:12:35.613ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
179952025-03-07T23:12:35.613ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
179962025-03-07T23:12:35.613ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
179972025-03-07T23:12:35.613ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
179982025-03-07T23:12:35.614ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
179992025-03-07T23:12:35.614ZINFOtest_unauthorized (external client test context): client received response status = 200
180002025-03-07T23:12:35.614ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/utilization/silos/demo-silo
180012025-03-07T23:12:35.615ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
180022025-03-07T23:12:35.615ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
180032025-03-07T23:12:35.616ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
180042025-03-07T23:12:35.616ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
180052025-03-07T23:12:35.616ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
180062025-03-07T23:12:35.616ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8deb4af7-16e6-4a8d-88ad-296c75be8789 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
180072025-03-07T23:12:35.617ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8deb4af7-16e6-4a8d-88ad-296c75be8789 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
180082025-03-07T23:12:35.617ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8deb4af7-16e6-4a8d-88ad-296c75be8789 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
180092025-03-07T23:12:35.619ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8deb4af7-16e6-4a8d-88ad-296c75be8789 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
180102025-03-07T23:12:35.621ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6003 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8deb4af7-16e6-4a8d-88ad-296c75be8789 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
180112025-03-07T23:12:35.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 uri = /v1/system/utilization/silos/demo-silo
180122025-03-07T23:12:35.622ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 uri = /v1/system/utilization/silos/demo-silo
180132025-03-07T23:12:35.622ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/utilization/silos/demo-silo
180142025-03-07T23:12:35.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180152025-03-07T23:12:35.624ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180162025-03-07T23:12:35.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180172025-03-07T23:12:35.624ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
180182025-03-07T23:12:35.625ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
180192025-03-07T23:12:35.625ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
180202025-03-07T23:12:35.625ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
180212025-03-07T23:12:35.625ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "8deb4af7-16e6-4a8d-88ad-296c75be8789", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:34 GMT"} })
180222025-03-07T23:12:35.625ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180232025-03-07T23:12:35.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180242025-03-07T23:12:35.631ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180252025-03-07T23:12:35.631ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180262025-03-07T23:12:35.633ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
180272025-03-07T23:12:35.633ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
180282025-03-07T23:12:35.633ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180292025-03-07T23:12:35.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180302025-03-07T23:12:35.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180312025-03-07T23:12:35.635ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0181c281-466e-47ef-9a46-28945bbf3cce uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180322025-03-07T23:12:35.636ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0181c281-466e-47ef-9a46-28945bbf3cce resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180332025-03-07T23:12:35.637ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0181c281-466e-47ef-9a46-28945bbf3cce roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180342025-03-07T23:12:35.637ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0181c281-466e-47ef-9a46-28945bbf3cce resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180352025-03-07T23:12:35.639ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3964 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0181c281-466e-47ef-9a46-28945bbf3cce response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
180362025-03-07T23:12:35.673ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
180372025-03-07T23:12:35.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180382025-03-07T23:12:35.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180392025-03-07T23:12:35.674ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180402025-03-07T23:12:35.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
180412025-03-07T23:12:35.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
180422025-03-07T23:12:35.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180432025-03-07T23:12:35.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180442025-03-07T23:12:35.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180452025-03-07T23:12:35.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
180462025-03-07T23:12:35.700ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
180472025-03-07T23:12:35.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180482025-03-07T23:12:35.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180492025-03-07T23:12:35.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180502025-03-07T23:12:35.703ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
180512025-03-07T23:12:35.703ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "0181c281-466e-47ef-9a46-28945bbf3cce", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:34 GMT"} })
180522025-03-07T23:12:35.703ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
180532025-03-07T23:12:35.703ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
180542025-03-07T23:12:35.703ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
180552025-03-07T23:12:35.704ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
180562025-03-07T23:12:35.705ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180572025-03-07T23:12:35.705ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180582025-03-07T23:12:35.705ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180592025-03-07T23:12:35.709ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
180602025-03-07T23:12:35.709ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
180612025-03-07T23:12:35.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
180622025-03-07T23:12:35.716ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
180632025-03-07T23:12:35.716ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 uri = /v1/system/utilization/silos/demo-silo
180642025-03-07T23:12:35.716ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database uri = /v1/system/utilization/silos/demo-silo
180652025-03-07T23:12:35.716ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
180662025-03-07T23:12:35.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
180672025-03-07T23:12:35.724ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
180682025-03-07T23:12:35.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
180692025-03-07T23:12:35.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database uri = /v1/system/utilization/silos/demo-silo
180702025-03-07T23:12:35.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
180712025-03-07T23:12:35.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
180722025-03-07T23:12:35.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
180732025-03-07T23:12:35.738ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database uri = /v1/system/utilization/silos/demo-silo
180742025-03-07T23:12:35.738ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
180752025-03-07T23:12:35.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
180762025-03-07T23:12:35.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
180772025-03-07T23:12:35.752ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/utilization/silos/demo-silo
180782025-03-07T23:12:35.753ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 130972 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d58e467-85a8-4327-93b9-7405ab6810a1 response_code = 404 uri = /v1/system/utilization/silos/demo-silo
180792025-03-07T23:12:35.753ZINFOtest_unauthorized (external client test context): client received response status = 404
180802025-03-07T23:12:35.754ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/utilization/silos/demo-silo
180812025-03-07T23:12:35.754ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
180822025-03-07T23:12:35.754ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 uri = /v1/system/utilization/silos/demo-silo
180832025-03-07T23:12:35.754ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 uri = /v1/system/utilization/silos/demo-silo
180842025-03-07T23:12:35.754ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 uri = /v1/system/utilization/silos/demo-silo
180852025-03-07T23:12:35.756ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 uri = /v1/system/utilization/silos/demo-silo
180862025-03-07T23:12:35.759ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 resource = Database uri = /v1/system/utilization/silos/demo-silo
180872025-03-07T23:12:35.759ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
180882025-03-07T23:12:35.759ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/utilization/silos/demo-silo
180892025-03-07T23:12:35.759ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 963 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2622ed-5e01-4e9e-b3ed-64db41da0895 response_code = 401 uri = /v1/system/utilization/silos/demo-silo
180902025-03-07T23:12:35.761ZINFOtest_unauthorized (external client test context): client received response status = 401
180912025-03-07T23:12:35.764ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/utilization/silos/demo-silo
180922025-03-07T23:12:35.764ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
180932025-03-07T23:12:35.764ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7de037d8-d695-4df3-8a93-c7fea910d4ee uri = /v1/system/utilization/silos/demo-silo
180942025-03-07T23:12:35.764ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7de037d8-d695-4df3-8a93-c7fea910d4ee uri = /v1/system/utilization/silos/demo-silo
180952025-03-07T23:12:35.764ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7de037d8-d695-4df3-8a93-c7fea910d4ee uri = /v1/system/utilization/silos/demo-silo
180962025-03-07T23:12:35.764ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 193 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7de037d8-d695-4df3-8a93-c7fea910d4ee response_code = 401 uri = /v1/system/utilization/silos/demo-silo
180972025-03-07T23:12:35.764ZINFOtest_unauthorized (external client test context): client received response status = 401
180982025-03-07T23:12:35.764ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/utilization/silos/demo-silo
180992025-03-07T23:12:35.764ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181002025-03-07T23:12:35.764ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e315e963-74f1-4cd7-822e-0468aa9def7c uri = /v1/system/utilization/silos/demo-silo
181012025-03-07T23:12:35.765ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e315e963-74f1-4cd7-822e-0468aa9def7c uri = /v1/system/utilization/silos/demo-silo
181022025-03-07T23:12:35.765ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:258:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:270:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e315e963-74f1-4cd7-822e-0468aa9def7c uri = /v1/system/utilization/silos/demo-silo
181032025-03-07T23:12:35.765ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1146 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e315e963-74f1-4cd7-822e-0468aa9def7c response_code = 401 uri = /v1/system/utilization/silos/demo-silo
181042025-03-07T23:12:35.765ZINFOtest_unauthorized (external client test context): client received response status = 401
181052025-03-07T23:12:35.765ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/utilization/silos/demo-silo
181062025-03-07T23:12:35.765ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181072025-03-07T23:12:35.765ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64edc9bd-c348-4e1a-96e9-cb488b27351e uri = /v1/system/utilization/silos/demo-silo
181082025-03-07T23:12:35.765ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 64edc9bd-c348-4e1a-96e9-cb488b27351e response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181092025-03-07T23:12:35.767ZINFOtest_unauthorized (external client test context): client received response status = 405
181102025-03-07T23:12:35.767ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/utilization/silos/demo-silo
181112025-03-07T23:12:35.768ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181122025-03-07T23:12:35.768ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0bc115d4-6c5e-44b1-a3be-6d7df87de088 uri = /v1/system/utilization/silos/demo-silo
181132025-03-07T23:12:35.768ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 201 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0bc115d4-6c5e-44b1-a3be-6d7df87de088 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181142025-03-07T23:12:35.791ZINFOtest_unauthorized (external client test context): client received response status = 405
181152025-03-07T23:12:35.791ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/utilization/silos/demo-silo
181162025-03-07T23:12:35.791ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181172025-03-07T23:12:35.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93b37545-6cf4-417b-8dde-c252148d2c05 uri = /v1/system/utilization/silos/demo-silo
181182025-03-07T23:12:35.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 288 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93b37545-6cf4-417b-8dde-c252148d2c05 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181192025-03-07T23:12:35.796ZINFOtest_unauthorized (external client test context): client received response status = 405
181202025-03-07T23:12:35.820ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/utilization/silos/demo-silo
181212025-03-07T23:12:35.820ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181222025-03-07T23:12:35.820ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 855d71ee-4a0d-43d6-95a8-608ed148e335 uri = /v1/system/utilization/silos/demo-silo
181232025-03-07T23:12:35.820ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 855d71ee-4a0d-43d6-95a8-608ed148e335 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181242025-03-07T23:12:35.820ZINFOtest_unauthorized (external client test context): client received response status = 405
181252025-03-07T23:12:35.820ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/utilization/silos/demo-silo
181262025-03-07T23:12:35.820ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181272025-03-07T23:12:35.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2152a728-9fbd-4bda-9297-a5b0a0803d6f uri = /v1/system/utilization/silos/demo-silo
181282025-03-07T23:12:35.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 113 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2152a728-9fbd-4bda-9297-a5b0a0803d6f response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181292025-03-07T23:12:35.826ZINFOtest_unauthorized (external client test context): client received response status = 405
181302025-03-07T23:12:35.826ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/utilization/silos/demo-silo
181312025-03-07T23:12:35.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181322025-03-07T23:12:35.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 851ffa61-bbd0-4ac5-92a8-e68083e3deae uri = /v1/system/utilization/silos/demo-silo
181332025-03-07T23:12:35.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 98 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 851ffa61-bbd0-4ac5-92a8-e68083e3deae response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181342025-03-07T23:12:35.828ZINFOtest_unauthorized (external client test context): client received response status = 405
181352025-03-07T23:12:35.828ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/utilization/silos/demo-silo
181362025-03-07T23:12:35.829ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181372025-03-07T23:12:35.829ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9d772902-4a67-406f-9216-4a6401d267e7 uri = /v1/system/utilization/silos/demo-silo
181382025-03-07T23:12:35.829ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9d772902-4a67-406f-9216-4a6401d267e7 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181392025-03-07T23:12:35.830ZINFOtest_unauthorized (external client test context): client received response status = 405
181402025-03-07T23:12:35.830ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/utilization/silos/demo-silo
181412025-03-07T23:12:35.830ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181422025-03-07T23:12:35.831ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e539b25-3a31-44b5-a5c9-b06105f81e26 uri = /v1/system/utilization/silos/demo-silo
181432025-03-07T23:12:35.831ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7e539b25-3a31-44b5-a5c9-b06105f81e26 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181442025-03-07T23:12:35.831ZINFOtest_unauthorized (external client test context): client received response status = 405
181452025-03-07T23:12:35.831ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/utilization/silos/demo-silo
181462025-03-07T23:12:35.831ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181472025-03-07T23:12:35.831ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d263485-f942-436d-8874-cd4dde3a21f2 uri = /v1/system/utilization/silos/demo-silo
181482025-03-07T23:12:35.831ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d263485-f942-436d-8874-cd4dde3a21f2 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181492025-03-07T23:12:35.831ZINFOtest_unauthorized (external client test context): client received response status = 405
181502025-03-07T23:12:35.831ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/utilization/silos/demo-silo
181512025-03-07T23:12:35.831ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181522025-03-07T23:12:35.831ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a9c89b74-6072-4077-9ade-6c886eb8885c uri = /v1/system/utilization/silos/demo-silo
181532025-03-07T23:12:35.833ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a9c89b74-6072-4077-9ade-6c886eb8885c response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181542025-03-07T23:12:35.833ZINFOtest_unauthorized (external client test context): client received response status = 405
181552025-03-07T23:12:35.833ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/utilization/silos/demo-silo
181562025-03-07T23:12:35.833ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181572025-03-07T23:12:35.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c2e46c15-ce44-49ca-a6c1-de2935497520 uri = /v1/system/utilization/silos/demo-silo
181582025-03-07T23:12:35.835ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c2e46c15-ce44-49ca-a6c1-de2935497520 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181592025-03-07T23:12:35.835ZINFOtest_unauthorized (external client test context): client received response status = 405
181602025-03-07T23:12:35.835ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/utilization/silos/demo-silo
181612025-03-07T23:12:35.835ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181622025-03-07T23:12:35.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 10886591-0a19-437e-913f-220406b13c50 uri = /v1/system/utilization/silos/demo-silo
181632025-03-07T23:12:35.835ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 10886591-0a19-437e-913f-220406b13c50 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181642025-03-07T23:12:35.836ZINFOtest_unauthorized (external client test context): client received response status = 405
181652025-03-07T23:12:35.836ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/utilization/silos/demo-silo
181662025-03-07T23:12:35.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181672025-03-07T23:12:35.836ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 81daa43f-82a6-4d5c-b6c3-54284c106db4 uri = /v1/system/utilization/silos/demo-silo
181682025-03-07T23:12:35.836ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 81daa43f-82a6-4d5c-b6c3-54284c106db4 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181692025-03-07T23:12:35.836ZINFOtest_unauthorized (external client test context): client received response status = 405
181702025-03-07T23:12:35.836ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/utilization/silos/demo-silo
181712025-03-07T23:12:35.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181722025-03-07T23:12:35.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 803cdcac-2059-490a-9cf3-2d44db4dc122 uri = /v1/system/utilization/silos/demo-silo
181732025-03-07T23:12:35.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 803cdcac-2059-490a-9cf3-2d44db4dc122 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181742025-03-07T23:12:35.837ZINFOtest_unauthorized (external client test context): client received response status = 405
181752025-03-07T23:12:35.837ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/utilization/silos/demo-silo
181762025-03-07T23:12:35.840ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181772025-03-07T23:12:35.840ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8205d80b-013a-43b9-8e13-1b1abb3a1fe3 uri = /v1/system/utilization/silos/demo-silo
181782025-03-07T23:12:35.841ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8205d80b-013a-43b9-8e13-1b1abb3a1fe3 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181792025-03-07T23:12:35.841ZINFOtest_unauthorized (external client test context): client received response status = 405
181802025-03-07T23:12:35.851ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/utilization/silos/demo-silo
181812025-03-07T23:12:35.856ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181822025-03-07T23:12:35.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3851f527-e7bf-4376-98f9-71f05860ee0c uri = /v1/system/utilization/silos/demo-silo
181832025-03-07T23:12:35.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3851f527-e7bf-4376-98f9-71f05860ee0c response_code = 405 uri = /v1/system/utilization/silos/demo-silo
181842025-03-07T23:12:35.859ZINFOtest_unauthorized (external client test context): client received response status = 405
181852025-03-07T23:12:35.859ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/utilization/silos/demo-silo
181862025-03-07T23:12:35.859ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/utilization/silos/demo-silo
181872025-03-07T23:12:35.859ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 uri = /v1/system/utilization/silos/demo-silo
181882025-03-07T23:12:35.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 uri = /v1/system/utilization/silos/demo-silo
181892025-03-07T23:12:35.860ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos/demo-silo
181902025-03-07T23:12:35.860ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181912025-03-07T23:12:35.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181922025-03-07T23:12:35.860ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181932025-03-07T23:12:35.860ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181942025-03-07T23:12:35.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181952025-03-07T23:12:35.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181962025-03-07T23:12:35.861ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
181972025-03-07T23:12:35.861ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
181982025-03-07T23:12:35.861ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181992025-03-07T23:12:35.861ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182002025-03-07T23:12:35.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182012025-03-07T23:12:35.861ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
182022025-03-07T23:12:35.861ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182032025-03-07T23:12:35.861ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182042025-03-07T23:12:35.862ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182052025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
182062025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
182072025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182082025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182092025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182102025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
182112025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
182122025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182132025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182142025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182152025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
182162025-03-07T23:12:35.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182172025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182182025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182192025-03-07T23:12:35.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
182202025-03-07T23:12:35.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
182212025-03-07T23:12:35.879ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 uri = /v1/system/utilization/silos/demo-silo
182222025-03-07T23:12:35.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182232025-03-07T23:12:35.883ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182242025-03-07T23:12:35.883ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182252025-03-07T23:12:35.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
182262025-03-07T23:12:35.887ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
182272025-03-07T23:12:35.888ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182282025-03-07T23:12:35.888ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182292025-03-07T23:12:35.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182302025-03-07T23:12:35.894ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
182312025-03-07T23:12:35.894ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182322025-03-07T23:12:35.895ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182332025-03-07T23:12:35.896ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182342025-03-07T23:12:35.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
182352025-03-07T23:12:35.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182362025-03-07T23:12:35.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
182372025-03-07T23:12:35.922ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource_id = 9d15cba3-0ce9-4052-9d95-bc0faa728916 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
182382025-03-07T23:12:35.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182392025-03-07T23:12:35.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182402025-03-07T23:12:35.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182412025-03-07T23:12:35.922ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
182422025-03-07T23:12:35.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182432025-03-07T23:12:35.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182442025-03-07T23:12:35.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182452025-03-07T23:12:35.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
182462025-03-07T23:12:35.955ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Silo { parent: Fleet, key: 9d15cba3-0ce9-4052-9d95-bc0faa728916, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182472025-03-07T23:12:35.958ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database uri = /v1/system/utilization/silos/demo-silo
182482025-03-07T23:12:35.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182492025-03-07T23:12:35.959ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182502025-03-07T23:12:35.965ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 130885 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8d97143b-d848-4782-a200-38a7f4675497 response_code = 200 uri = /v1/system/utilization/silos/demo-silo
182512025-03-07T23:12:35.966ZINFOtest_unauthorized (external client test context): client received response status = 200
182522025-03-07T23:12:35.966ZINFOtest_unauthorized: test: begin endpoint url = /v1/utilization
182532025-03-07T23:12:35.966ZINFOtest_unauthorized: test: privileged GET url = /v1/utilization
182542025-03-07T23:12:35.966ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/utilization
182552025-03-07T23:12:35.967ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe uri = /v1/utilization
182562025-03-07T23:12:35.980ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe uri = /v1/utilization
182572025-03-07T23:12:35.980ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/utilization
182582025-03-07T23:12:35.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182592025-03-07T23:12:35.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182602025-03-07T23:12:35.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182612025-03-07T23:12:35.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182622025-03-07T23:12:35.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182632025-03-07T23:12:35.986ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182642025-03-07T23:12:35.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
182652025-03-07T23:12:35.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
182662025-03-07T23:12:35.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182672025-03-07T23:12:35.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182682025-03-07T23:12:35.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182692025-03-07T23:12:35.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
182702025-03-07T23:12:35.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182712025-03-07T23:12:35.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182722025-03-07T23:12:36.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182732025-03-07T23:12:36.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
182742025-03-07T23:12:36.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
182752025-03-07T23:12:36.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182762025-03-07T23:12:36.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182772025-03-07T23:12:36.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182782025-03-07T23:12:36.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
182792025-03-07T23:12:36.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
182802025-03-07T23:12:36.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182812025-03-07T23:12:36.061ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182822025-03-07T23:12:36.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182832025-03-07T23:12:36.071ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
182842025-03-07T23:12:36.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
182852025-03-07T23:12:36.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
182862025-03-07T23:12:36.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
182872025-03-07T23:12:36.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
182882025-03-07T23:12:36.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
182892025-03-07T23:12:36.081ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe uri = /v1/utilization
182902025-03-07T23:12:36.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
182912025-03-07T23:12:36.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
182922025-03-07T23:12:36.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
182932025-03-07T23:12:36.087ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
182942025-03-07T23:12:36.088ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
182952025-03-07T23:12:36.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
182962025-03-07T23:12:36.088ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
182972025-03-07T23:12:36.089ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
182982025-03-07T23:12:36.095ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
182992025-03-07T23:12:36.095ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
183002025-03-07T23:12:36.096ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
183012025-03-07T23:12:36.097ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
183022025-03-07T23:12:36.100ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
183032025-03-07T23:12:36.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
183042025-03-07T23:12:36.110ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
183052025-03-07T23:12:36.110ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
183062025-03-07T23:12:36.110ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
183072025-03-07T23:12:36.110ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
183082025-03-07T23:12:36.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
183092025-03-07T23:12:36.137ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
183102025-03-07T23:12:36.137ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
183112025-03-07T23:12:36.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
183122025-03-07T23:12:36.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
183132025-03-07T23:12:36.149ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
183142025-03-07T23:12:36.152ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
183152025-03-07T23:12:36.154ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database uri = /v1/utilization
183162025-03-07T23:12:36.154ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe roles = RoleSet { roles: {} } uri = /v1/utilization
183172025-03-07T23:12:36.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe resource = Database result = Ok(()) uri = /v1/utilization
183182025-03-07T23:12:36.158ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 191606 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a3ed965-c089-4d67-af15-2915894a32fe response_code = 200 uri = /v1/utilization
183192025-03-07T23:12:36.159ZINFOtest_unauthorized (external client test context): client received response status = 200
183202025-03-07T23:12:36.159ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/utilization
183212025-03-07T23:12:36.160ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/utilization
183222025-03-07T23:12:36.160ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/utilization
183232025-03-07T23:12:36.160ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b24b0d-edba-4575-a9b8-e53d318542cf uri = /v1/utilization
183242025-03-07T23:12:36.160ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b24b0d-edba-4575-a9b8-e53d318542cf uri = /v1/utilization
183252025-03-07T23:12:36.161ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b24b0d-edba-4575-a9b8-e53d318542cf uri = /v1/utilization
183262025-03-07T23:12:36.161ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b24b0d-edba-4575-a9b8-e53d318542cf uri = /v1/utilization
183272025-03-07T23:12:36.161ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up current silo: Actor required latency_us = 236 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b24b0d-edba-4575-a9b8-e53d318542cf response_code = 401 uri = /v1/utilization
183282025-03-07T23:12:36.161ZINFOtest_unauthorized (external client test context): client received response status = 401
183292025-03-07T23:12:36.161ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/utilization
183302025-03-07T23:12:36.161ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/utilization
183312025-03-07T23:12:36.161ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7324e619-bbd9-40e7-8352-494d6539c221 uri = /v1/utilization
183322025-03-07T23:12:36.161ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7324e619-bbd9-40e7-8352-494d6539c221 uri = /v1/utilization
183332025-03-07T23:12:36.161ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7324e619-bbd9-40e7-8352-494d6539c221 uri = /v1/utilization
183342025-03-07T23:12:36.161ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 180 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7324e619-bbd9-40e7-8352-494d6539c221 response_code = 401 uri = /v1/utilization
183352025-03-07T23:12:36.161ZINFOtest_unauthorized (external client test context): client received response status = 401
183362025-03-07T23:12:36.161ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/utilization
183372025-03-07T23:12:36.163ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/utilization
183382025-03-07T23:12:36.163ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0fddc62e-b0d4-43ad-8292-d306a9ea0722 uri = /v1/utilization
183392025-03-07T23:12:36.163ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0fddc62e-b0d4-43ad-8292-d306a9ea0722 uri = /v1/utilization
183402025-03-07T23:12:36.164ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:235:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:246:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0fddc62e-b0d4-43ad-8292-d306a9ea0722 uri = /v1/utilization
183412025-03-07T23:12:36.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1018 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0fddc62e-b0d4-43ad-8292-d306a9ea0722 response_code = 401 uri = /v1/utilization
183422025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client received response status = 401
183432025-03-07T23:12:36.164ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/utilization
183442025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/utilization
183452025-03-07T23:12:36.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52fcc6bb-cafe-442e-81c0-7bb0f11d0085 uri = /v1/utilization
183462025-03-07T23:12:36.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52fcc6bb-cafe-442e-81c0-7bb0f11d0085 response_code = 405 uri = /v1/utilization
183472025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client received response status = 405
183482025-03-07T23:12:36.164ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/utilization
183492025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/utilization
183502025-03-07T23:12:36.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6f6ee6ca-84a1-4bed-a308-47e2f6a6b3cc uri = /v1/utilization
183512025-03-07T23:12:36.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6f6ee6ca-84a1-4bed-a308-47e2f6a6b3cc response_code = 405 uri = /v1/utilization
183522025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client received response status = 405
183532025-03-07T23:12:36.164ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/utilization
183542025-03-07T23:12:36.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/utilization
183552025-03-07T23:12:36.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c2f44330-db86-4657-9196-0881c88e9293 uri = /v1/utilization
183562025-03-07T23:12:36.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c2f44330-db86-4657-9196-0881c88e9293 response_code = 405 uri = /v1/utilization
183572025-03-07T23:12:36.165ZINFOtest_unauthorized (external client test context): client received response status = 405
183582025-03-07T23:12:36.165ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/utilization
183592025-03-07T23:12:36.165ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/utilization
183602025-03-07T23:12:36.165ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bfd35222-2b31-4bf5-9204-627b7eb82083 uri = /v1/utilization
183612025-03-07T23:12:36.165ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bfd35222-2b31-4bf5-9204-627b7eb82083 response_code = 405 uri = /v1/utilization
183622025-03-07T23:12:36.165ZINFOtest_unauthorized (external client test context): client received response status = 405
183632025-03-07T23:12:36.166ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/utilization
183642025-03-07T23:12:36.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/utilization
183652025-03-07T23:12:36.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d50c723-bef0-4d61-ba3e-863741857204 uri = /v1/utilization
183662025-03-07T23:12:36.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 165 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d50c723-bef0-4d61-ba3e-863741857204 response_code = 405 uri = /v1/utilization
183672025-03-07T23:12:36.166ZINFOtest_unauthorized (external client test context): client received response status = 405
183682025-03-07T23:12:36.166ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/utilization
183692025-03-07T23:12:36.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/utilization
183702025-03-07T23:12:36.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8e63264b-1bf2-4a56-ae5c-98525ab08b7e uri = /v1/utilization
183712025-03-07T23:12:36.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8e63264b-1bf2-4a56-ae5c-98525ab08b7e response_code = 405 uri = /v1/utilization
183722025-03-07T23:12:36.168ZINFOtest_unauthorized (external client test context): client received response status = 405
183732025-03-07T23:12:36.168ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/utilization
183742025-03-07T23:12:36.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/utilization
183752025-03-07T23:12:36.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2b7cef1-6381-4383-a21e-979f5d88096d uri = /v1/utilization
183762025-03-07T23:12:36.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2b7cef1-6381-4383-a21e-979f5d88096d response_code = 405 uri = /v1/utilization
183772025-03-07T23:12:36.168ZINFOtest_unauthorized (external client test context): client received response status = 405
183782025-03-07T23:12:36.169ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/utilization
183792025-03-07T23:12:36.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/utilization
183802025-03-07T23:12:36.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f499f88b-b5d0-48ec-a8d9-67a1aa9d20da uri = /v1/utilization
183812025-03-07T23:12:36.169ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f499f88b-b5d0-48ec-a8d9-67a1aa9d20da response_code = 405 uri = /v1/utilization
183822025-03-07T23:12:36.169ZINFOtest_unauthorized (external client test context): client received response status = 405
183832025-03-07T23:12:36.169ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/utilization
183842025-03-07T23:12:36.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/utilization
183852025-03-07T23:12:36.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15417dc-bf97-432e-bab9-2c42a435709a uri = /v1/utilization
183862025-03-07T23:12:36.169ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15417dc-bf97-432e-bab9-2c42a435709a response_code = 405 uri = /v1/utilization
183872025-03-07T23:12:36.169ZINFOtest_unauthorized (external client test context): client received response status = 405
183882025-03-07T23:12:36.169ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/utilization
183892025-03-07T23:12:36.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/utilization
183902025-03-07T23:12:36.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 532739d9-a774-4e60-8cb2-6c061bf4cc33 uri = /v1/utilization
183912025-03-07T23:12:36.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 532739d9-a774-4e60-8cb2-6c061bf4cc33 response_code = 405 uri = /v1/utilization
183922025-03-07T23:12:36.170ZINFOtest_unauthorized (external client test context): client received response status = 405
183932025-03-07T23:12:36.170ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/utilization
183942025-03-07T23:12:36.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/utilization
183952025-03-07T23:12:36.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d4188e8-a62e-4cf3-87b7-274102362e7a uri = /v1/utilization
183962025-03-07T23:12:36.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4d4188e8-a62e-4cf3-87b7-274102362e7a response_code = 405 uri = /v1/utilization
183972025-03-07T23:12:36.170ZINFOtest_unauthorized (external client test context): client received response status = 405
183982025-03-07T23:12:36.171ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/utilization
183992025-03-07T23:12:36.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/utilization
184002025-03-07T23:12:36.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b5268e5-c6d3-43ff-8a83-2561f7f9d150 uri = /v1/utilization
184012025-03-07T23:12:36.171ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b5268e5-c6d3-43ff-8a83-2561f7f9d150 response_code = 405 uri = /v1/utilization
184022025-03-07T23:12:36.171ZINFOtest_unauthorized (external client test context): client received response status = 405
184032025-03-07T23:12:36.171ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/utilization
184042025-03-07T23:12:36.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/utilization
184052025-03-07T23:12:36.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 492cafb8-13f2-43a6-b31d-02f9c2d69b27 uri = /v1/utilization
184062025-03-07T23:12:36.172ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 492cafb8-13f2-43a6-b31d-02f9c2d69b27 response_code = 405 uri = /v1/utilization
184072025-03-07T23:12:36.172ZINFOtest_unauthorized (external client test context): client received response status = 405
184082025-03-07T23:12:36.172ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/utilization
184092025-03-07T23:12:36.172ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/utilization
184102025-03-07T23:12:36.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 57424af8-aa19-452f-9563-c900d2247aea uri = /v1/utilization
184112025-03-07T23:12:36.172ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 57424af8-aa19-452f-9563-c900d2247aea response_code = 405 uri = /v1/utilization
184122025-03-07T23:12:36.173ZINFOtest_unauthorized (external client test context): client received response status = 405
184132025-03-07T23:12:36.173ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/utilization
184142025-03-07T23:12:36.173ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/utilization
184152025-03-07T23:12:36.173ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a59353ba-9bab-40a9-8120-f281b7171f55 uri = /v1/utilization
184162025-03-07T23:12:36.175ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a59353ba-9bab-40a9-8120-f281b7171f55 response_code = 405 uri = /v1/utilization
184172025-03-07T23:12:36.175ZINFOtest_unauthorized (external client test context): client received response status = 405
184182025-03-07T23:12:36.175ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/utilization
184192025-03-07T23:12:36.175ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/utilization
184202025-03-07T23:12:36.175ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b80526d9-f2de-49c0-a2a4-ab8d50ec76a6 uri = /v1/utilization
184212025-03-07T23:12:36.175ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b80526d9-f2de-49c0-a2a4-ab8d50ec76a6 response_code = 405 uri = /v1/utilization
184222025-03-07T23:12:36.176ZINFOtest_unauthorized (external client test context): client received response status = 405
184232025-03-07T23:12:36.176ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/utilization
184242025-03-07T23:12:36.176ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/utilization
184252025-03-07T23:12:36.176ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f uri = /v1/utilization
184262025-03-07T23:12:36.176ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f uri = /v1/utilization
184272025-03-07T23:12:36.176ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/utilization
184282025-03-07T23:12:36.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184292025-03-07T23:12:36.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184302025-03-07T23:12:36.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184312025-03-07T23:12:36.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184322025-03-07T23:12:36.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184332025-03-07T23:12:36.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184342025-03-07T23:12:36.179ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
184352025-03-07T23:12:36.179ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
184362025-03-07T23:12:36.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184372025-03-07T23:12:36.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184382025-03-07T23:12:36.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184392025-03-07T23:12:36.182ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
184402025-03-07T23:12:36.183ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184412025-03-07T23:12:36.185ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184422025-03-07T23:12:36.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184432025-03-07T23:12:36.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
184442025-03-07T23:12:36.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
184452025-03-07T23:12:36.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184462025-03-07T23:12:36.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184472025-03-07T23:12:36.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184482025-03-07T23:12:36.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
184492025-03-07T23:12:36.196ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
184502025-03-07T23:12:36.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184512025-03-07T23:12:36.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184522025-03-07T23:12:36.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184532025-03-07T23:12:36.197ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
184542025-03-07T23:12:36.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184552025-03-07T23:12:36.199ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184562025-03-07T23:12:36.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184572025-03-07T23:12:36.203ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
184582025-03-07T23:12:36.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
184592025-03-07T23:12:36.207ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f uri = /v1/utilization
184602025-03-07T23:12:36.209ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184612025-03-07T23:12:36.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184622025-03-07T23:12:36.209ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184632025-03-07T23:12:36.211ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
184642025-03-07T23:12:36.211ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
184652025-03-07T23:12:36.212ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184662025-03-07T23:12:36.212ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184672025-03-07T23:12:36.213ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184682025-03-07T23:12:36.216ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
184692025-03-07T23:12:36.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184702025-03-07T23:12:36.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184712025-03-07T23:12:36.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184722025-03-07T23:12:36.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
184732025-03-07T23:12:36.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
184742025-03-07T23:12:36.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
184752025-03-07T23:12:36.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
184762025-03-07T23:12:36.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
184772025-03-07T23:12:36.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
184782025-03-07T23:12:36.227ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
184792025-03-07T23:12:36.227ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
184802025-03-07T23:12:36.227ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184812025-03-07T23:12:36.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184822025-03-07T23:12:36.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184832025-03-07T23:12:36.233ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
184842025-03-07T23:12:36.233ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184852025-03-07T23:12:36.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184862025-03-07T23:12:36.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184872025-03-07T23:12:36.236ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
184882025-03-07T23:12:36.236ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
184892025-03-07T23:12:36.240ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
184902025-03-07T23:12:36.250ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
184912025-03-07T23:12:36.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database uri = /v1/utilization
184922025-03-07T23:12:36.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f roles = RoleSet { roles: {} } uri = /v1/utilization
184932025-03-07T23:12:36.253ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f resource = Database result = Ok(()) uri = /v1/utilization
184942025-03-07T23:12:36.261ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
184952025-03-07T23:12:36.261ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
184962025-03-07T23:12:36.263ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 88384 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd9f1abd-2910-43ce-95c3-05acf9ee932f response_code = 200 uri = /v1/utilization
184972025-03-07T23:12:36.263ZINFOtest_unauthorized (external client test context): client received response status = 200
184982025-03-07T23:12:36.264ZINFOtest_unauthorized: test: begin endpoint url = /v1/policy
184992025-03-07T23:12:36.271ZINFOtest_unauthorized: test: privileged GET url = /v1/policy
185002025-03-07T23:12:36.271ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/policy
185012025-03-07T23:12:36.271ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 uri = /v1/policy
185022025-03-07T23:12:36.271ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 uri = /v1/policy
185032025-03-07T23:12:36.272ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/policy
185042025-03-07T23:12:36.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185052025-03-07T23:12:36.272ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185062025-03-07T23:12:36.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185072025-03-07T23:12:36.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185082025-03-07T23:12:36.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185092025-03-07T23:12:36.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185102025-03-07T23:12:36.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
185112025-03-07T23:12:36.299ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
185122025-03-07T23:12:36.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185132025-03-07T23:12:36.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185142025-03-07T23:12:36.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185152025-03-07T23:12:36.305ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
185162025-03-07T23:12:36.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185172025-03-07T23:12:36.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185182025-03-07T23:12:36.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185192025-03-07T23:12:36.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
185202025-03-07T23:12:36.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
185212025-03-07T23:12:36.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
185222025-03-07T23:12:36.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185232025-03-07T23:12:36.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185242025-03-07T23:12:36.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185252025-03-07T23:12:36.329ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
185262025-03-07T23:12:36.330ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
185272025-03-07T23:12:36.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185282025-03-07T23:12:36.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185292025-03-07T23:12:36.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185302025-03-07T23:12:36.334ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
185312025-03-07T23:12:36.335ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185322025-03-07T23:12:36.336ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185332025-03-07T23:12:36.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185342025-03-07T23:12:36.338ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
185352025-03-07T23:12:36.341ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
185362025-03-07T23:12:36.343ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 uri = /v1/policy
185372025-03-07T23:12:36.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185382025-03-07T23:12:36.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185392025-03-07T23:12:36.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185402025-03-07T23:12:36.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
185412025-03-07T23:12:36.344ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
185422025-03-07T23:12:36.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185432025-03-07T23:12:36.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185442025-03-07T23:12:36.345ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185452025-03-07T23:12:36.347ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
185462025-03-07T23:12:36.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185472025-03-07T23:12:36.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185482025-03-07T23:12:36.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185492025-03-07T23:12:36.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
185502025-03-07T23:12:36.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
185512025-03-07T23:12:36.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185522025-03-07T23:12:36.356ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185532025-03-07T23:12:36.357ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185542025-03-07T23:12:36.359ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
185552025-03-07T23:12:36.359ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
185562025-03-07T23:12:36.359ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185572025-03-07T23:12:36.359ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185582025-03-07T23:12:36.360ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185592025-03-07T23:12:36.363ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
185602025-03-07T23:12:36.363ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database uri = /v1/policy
185612025-03-07T23:12:36.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {} } uri = /v1/policy
185622025-03-07T23:12:36.364ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Database result = Ok(()) uri = /v1/policy
185632025-03-07T23:12:36.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
185642025-03-07T23:12:36.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
185652025-03-07T23:12:36.391ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 127304 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 325c392a-f395-41bd-9fc3-772a00054b44 response_code = 200 uri = /v1/policy
185662025-03-07T23:12:36.394ZINFOtest_unauthorized (external client test context): client received response status = 200
185672025-03-07T23:12:36.394ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/policy
185682025-03-07T23:12:36.394ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/policy
185692025-03-07T23:12:36.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/policy
185702025-03-07T23:12:36.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf21dfbf-f236-4b5a-9225-1b47d6d36034 uri = /v1/policy
185712025-03-07T23:12:36.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf21dfbf-f236-4b5a-9225-1b47d6d36034 uri = /v1/policy
185722025-03-07T23:12:36.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf21dfbf-f236-4b5a-9225-1b47d6d36034 uri = /v1/policy
185732025-03-07T23:12:36.394ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf21dfbf-f236-4b5a-9225-1b47d6d36034 uri = /v1/policy
185742025-03-07T23:12:36.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading current silo: Actor required latency_us = 287 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf21dfbf-f236-4b5a-9225-1b47d6d36034 response_code = 401 uri = /v1/policy
185752025-03-07T23:12:36.394ZINFOtest_unauthorized (external client test context): client received response status = 401
185762025-03-07T23:12:36.395ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/policy
185772025-03-07T23:12:36.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/policy
185782025-03-07T23:12:36.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8e8c09b-73b7-46d0-a275-bb214d9dd725 uri = /v1/policy
185792025-03-07T23:12:36.396ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8e8c09b-73b7-46d0-a275-bb214d9dd725 uri = /v1/policy
185802025-03-07T23:12:36.396ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8e8c09b-73b7-46d0-a275-bb214d9dd725 uri = /v1/policy
185812025-03-07T23:12:36.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 229 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8e8c09b-73b7-46d0-a275-bb214d9dd725 response_code = 401 uri = /v1/policy
185822025-03-07T23:12:36.396ZINFOtest_unauthorized (external client test context): client received response status = 401
185832025-03-07T23:12:36.396ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/policy
185842025-03-07T23:12:36.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/policy
185852025-03-07T23:12:36.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c415c725-9f21-4238-9497-fb3585d7c4eb uri = /v1/policy
185862025-03-07T23:12:36.396ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c415c725-9f21-4238-9497-fb3585d7c4eb uri = /v1/policy
185872025-03-07T23:12:36.398ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:176:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:192:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c415c725-9f21-4238-9497-fb3585d7c4eb uri = /v1/policy
185882025-03-07T23:12:36.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1760 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c415c725-9f21-4238-9497-fb3585d7c4eb response_code = 401 uri = /v1/policy
185892025-03-07T23:12:36.398ZINFOtest_unauthorized (external client test context): client received response status = 401
185902025-03-07T23:12:36.398ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/policy
185912025-03-07T23:12:36.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/policy
185922025-03-07T23:12:36.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 uri = /v1/policy
185932025-03-07T23:12:36.398ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 uri = /v1/policy
185942025-03-07T23:12:36.398ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/policy
185952025-03-07T23:12:36.399ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185962025-03-07T23:12:36.399ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185972025-03-07T23:12:36.400ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185982025-03-07T23:12:36.408ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185992025-03-07T23:12:36.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186002025-03-07T23:12:36.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186012025-03-07T23:12:36.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
186022025-03-07T23:12:36.411ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
186032025-03-07T23:12:36.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186042025-03-07T23:12:36.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186052025-03-07T23:12:36.412ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186062025-03-07T23:12:36.420ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
186072025-03-07T23:12:36.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186082025-03-07T23:12:36.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186092025-03-07T23:12:36.421ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186102025-03-07T23:12:36.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
186112025-03-07T23:12:36.429ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
186122025-03-07T23:12:36.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186132025-03-07T23:12:36.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186142025-03-07T23:12:36.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186152025-03-07T23:12:36.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
186162025-03-07T23:12:36.436ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
186172025-03-07T23:12:36.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186182025-03-07T23:12:36.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186192025-03-07T23:12:36.438ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186202025-03-07T23:12:36.440ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
186212025-03-07T23:12:36.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186222025-03-07T23:12:36.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186232025-03-07T23:12:36.441ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186242025-03-07T23:12:36.450ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
186252025-03-07T23:12:36.455ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
186262025-03-07T23:12:36.455ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 uri = /v1/policy
186272025-03-07T23:12:36.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database uri = /v1/policy
186282025-03-07T23:12:36.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 roles = RoleSet { roles: {} } uri = /v1/policy
186292025-03-07T23:12:36.456ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database result = Ok(()) uri = /v1/policy
186302025-03-07T23:12:36.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
186312025-03-07T23:12:36.463ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
186322025-03-07T23:12:36.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database uri = /v1/policy
186332025-03-07T23:12:36.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 roles = RoleSet { roles: {} } uri = /v1/policy
186342025-03-07T23:12:36.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database result = Ok(()) uri = /v1/policy
186352025-03-07T23:12:36.468ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
186362025-03-07T23:12:36.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database uri = /v1/policy
186372025-03-07T23:12:36.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 roles = RoleSet { roles: {} } uri = /v1/policy
186382025-03-07T23:12:36.470ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Database result = Ok(()) uri = /v1/policy
186392025-03-07T23:12:36.476ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 roles = RoleSet { roles: {} } uri = /v1/policy
186402025-03-07T23:12:36.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/policy
186412025-03-07T23:12:36.487ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 88906 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0626e419-c21d-4da4-8751-1193f547c4f8 response_code = 403 uri = /v1/policy
186422025-03-07T23:12:36.488ZINFOtest_unauthorized (external client test context): client received response status = 403
186432025-03-07T23:12:36.490ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/policy
186442025-03-07T23:12:36.490ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/policy
186452025-03-07T23:12:36.491ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e08ddec0-f248-4815-9fb4-ec842e69b253 uri = /v1/policy
186462025-03-07T23:12:36.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e08ddec0-f248-4815-9fb4-ec842e69b253 uri = /v1/policy
186472025-03-07T23:12:36.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e08ddec0-f248-4815-9fb4-ec842e69b253 uri = /v1/policy
186482025-03-07T23:12:36.492ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e08ddec0-f248-4815-9fb4-ec842e69b253 uri = /v1/policy
186492025-03-07T23:12:36.492ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading current silo: Actor required latency_us = 610 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e08ddec0-f248-4815-9fb4-ec842e69b253 response_code = 401 uri = /v1/policy
186502025-03-07T23:12:36.492ZINFOtest_unauthorized (external client test context): client received response status = 401
186512025-03-07T23:12:36.492ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/policy
186522025-03-07T23:12:36.492ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/policy
186532025-03-07T23:12:36.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36be1cf3-ff56-4fe8-9d84-ed4caa191539 uri = /v1/policy
186542025-03-07T23:12:36.493ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36be1cf3-ff56-4fe8-9d84-ed4caa191539 uri = /v1/policy
186552025-03-07T23:12:36.493ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36be1cf3-ff56-4fe8-9d84-ed4caa191539 uri = /v1/policy
186562025-03-07T23:12:36.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 533 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 36be1cf3-ff56-4fe8-9d84-ed4caa191539 response_code = 401 uri = /v1/policy
186572025-03-07T23:12:36.493ZINFOtest_unauthorized (external client test context): client received response status = 401
186582025-03-07T23:12:36.494ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/policy
186592025-03-07T23:12:36.494ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/policy
186602025-03-07T23:12:36.494ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3e0b571-bfe4-44e0-b236-0db032ef7345 uri = /v1/policy
186612025-03-07T23:12:36.494ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3e0b571-bfe4-44e0-b236-0db032ef7345 uri = /v1/policy
186622025-03-07T23:12:36.496ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:208:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:225:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3e0b571-bfe4-44e0-b236-0db032ef7345 uri = /v1/policy
186632025-03-07T23:12:36.496ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1345 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e3e0b571-bfe4-44e0-b236-0db032ef7345 response_code = 401 uri = /v1/policy
186642025-03-07T23:12:36.496ZINFOtest_unauthorized (external client test context): client received response status = 401
186652025-03-07T23:12:36.496ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/policy
186662025-03-07T23:12:36.497ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/policy
186672025-03-07T23:12:36.497ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3768e2a4-7fda-4f57-9fc7-808340ef6d15 uri = /v1/policy
186682025-03-07T23:12:36.497ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 101 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3768e2a4-7fda-4f57-9fc7-808340ef6d15 response_code = 405 uri = /v1/policy
186692025-03-07T23:12:36.498ZINFOtest_unauthorized (external client test context): client received response status = 405
186702025-03-07T23:12:36.498ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/policy
186712025-03-07T23:12:36.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/policy
186722025-03-07T23:12:36.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ee5eba9-c8bb-4000-b603-d3f66b3816c3 uri = /v1/policy
186732025-03-07T23:12:36.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ee5eba9-c8bb-4000-b603-d3f66b3816c3 response_code = 405 uri = /v1/policy
186742025-03-07T23:12:36.499ZINFOtest_unauthorized (external client test context): client received response status = 405
186752025-03-07T23:12:36.499ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/policy
186762025-03-07T23:12:36.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/policy
186772025-03-07T23:12:36.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a3df21d-4beb-44c2-bd21-9eb86454b612 uri = /v1/policy
186782025-03-07T23:12:36.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a3df21d-4beb-44c2-bd21-9eb86454b612 response_code = 405 uri = /v1/policy
186792025-03-07T23:12:36.499ZINFOtest_unauthorized (external client test context): client received response status = 405
186802025-03-07T23:12:36.500ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/policy
186812025-03-07T23:12:36.500ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/policy
186822025-03-07T23:12:36.500ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2a5d8d81-5cd7-425b-a3e0-f2e53cce0003 uri = /v1/policy
186832025-03-07T23:12:36.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2a5d8d81-5cd7-425b-a3e0-f2e53cce0003 response_code = 405 uri = /v1/policy
186842025-03-07T23:12:36.501ZINFOtest_unauthorized (external client test context): client received response status = 405
186852025-03-07T23:12:36.501ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/policy
186862025-03-07T23:12:36.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/policy
186872025-03-07T23:12:36.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 51c5ba50-ec4c-4599-ae55-7cdddf5c52fa uri = /v1/policy
186882025-03-07T23:12:36.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 51c5ba50-ec4c-4599-ae55-7cdddf5c52fa response_code = 405 uri = /v1/policy
186892025-03-07T23:12:36.501ZINFOtest_unauthorized (external client test context): client received response status = 405
186902025-03-07T23:12:36.501ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/policy
186912025-03-07T23:12:36.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/policy
186922025-03-07T23:12:36.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abf12478-abe4-4d5a-a336-12dc512bf1d4 uri = /v1/policy
186932025-03-07T23:12:36.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abf12478-abe4-4d5a-a336-12dc512bf1d4 response_code = 405 uri = /v1/policy
186942025-03-07T23:12:36.501ZINFOtest_unauthorized (external client test context): client received response status = 405
186952025-03-07T23:12:36.501ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/policy
186962025-03-07T23:12:36.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/policy
186972025-03-07T23:12:36.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8126224c-6a08-4359-9edd-a85e86fa8b54 uri = /v1/policy
186982025-03-07T23:12:36.502ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8126224c-6a08-4359-9edd-a85e86fa8b54 response_code = 405 uri = /v1/policy
186992025-03-07T23:12:36.502ZINFOtest_unauthorized (external client test context): client received response status = 405
187002025-03-07T23:12:36.502ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/policy
187012025-03-07T23:12:36.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/policy
187022025-03-07T23:12:36.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23aabbce-bb71-4e7b-a670-6fb3ab3160b9 uri = /v1/policy
187032025-03-07T23:12:36.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23aabbce-bb71-4e7b-a670-6fb3ab3160b9 response_code = 405 uri = /v1/policy
187042025-03-07T23:12:36.503ZINFOtest_unauthorized (external client test context): client received response status = 405
187052025-03-07T23:12:36.503ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/policy
187062025-03-07T23:12:36.503ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/policy
187072025-03-07T23:12:36.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5546c733-525f-4e12-be98-689460545a1c uri = /v1/policy
187082025-03-07T23:12:36.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5546c733-525f-4e12-be98-689460545a1c response_code = 405 uri = /v1/policy
187092025-03-07T23:12:36.503ZINFOtest_unauthorized (external client test context): client received response status = 405
187102025-03-07T23:12:36.503ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/policy
187112025-03-07T23:12:36.503ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/policy
187122025-03-07T23:12:36.504ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d4d57958-4a40-4ecc-9d42-4b16fae9b0f7 uri = /v1/policy
187132025-03-07T23:12:36.504ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d4d57958-4a40-4ecc-9d42-4b16fae9b0f7 response_code = 405 uri = /v1/policy
187142025-03-07T23:12:36.504ZINFOtest_unauthorized (external client test context): client received response status = 405
187152025-03-07T23:12:36.517ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/policy
187162025-03-07T23:12:36.517ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/policy
187172025-03-07T23:12:36.518ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fbdeb879-c4d7-416c-aa60-cb59859bd367 uri = /v1/policy
187182025-03-07T23:12:36.518ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fbdeb879-c4d7-416c-aa60-cb59859bd367 response_code = 405 uri = /v1/policy
187192025-03-07T23:12:36.518ZINFOtest_unauthorized (external client test context): client received response status = 405
187202025-03-07T23:12:36.518ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/policy
187212025-03-07T23:12:36.518ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/policy
187222025-03-07T23:12:36.518ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d852bd3-ff48-4e84-a1b1-d94c3a4de343 uri = /v1/policy
187232025-03-07T23:12:36.518ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d852bd3-ff48-4e84-a1b1-d94c3a4de343 response_code = 405 uri = /v1/policy
187242025-03-07T23:12:36.518ZINFOtest_unauthorized (external client test context): client received response status = 405
187252025-03-07T23:12:36.518ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/policy
187262025-03-07T23:12:36.518ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/policy
187272025-03-07T23:12:36.518ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f uri = /v1/policy
187282025-03-07T23:12:36.518ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f uri = /v1/policy
187292025-03-07T23:12:36.518ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/policy
187302025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187312025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187322025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187332025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187342025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187352025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187362025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
187372025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
187382025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187392025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187402025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187412025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
187422025-03-07T23:12:36.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187432025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187442025-03-07T23:12:36.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187452025-03-07T23:12:36.521ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
187462025-03-07T23:12:36.524ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
187472025-03-07T23:12:36.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187482025-03-07T23:12:36.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187492025-03-07T23:12:36.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187502025-03-07T23:12:36.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
187512025-03-07T23:12:36.527ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
187522025-03-07T23:12:36.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187532025-03-07T23:12:36.528ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187542025-03-07T23:12:36.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187552025-03-07T23:12:36.531ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
187562025-03-07T23:12:36.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187572025-03-07T23:12:36.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187582025-03-07T23:12:36.532ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187592025-03-07T23:12:36.534ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
187602025-03-07T23:12:36.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
187612025-03-07T23:12:36.539ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f uri = /v1/policy
187622025-03-07T23:12:36.539ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187632025-03-07T23:12:36.539ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187642025-03-07T23:12:36.539ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187652025-03-07T23:12:36.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
187662025-03-07T23:12:36.542ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
187672025-03-07T23:12:36.542ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187682025-03-07T23:12:36.542ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187692025-03-07T23:12:36.543ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187702025-03-07T23:12:36.546ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
187712025-03-07T23:12:36.546ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187722025-03-07T23:12:36.546ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187732025-03-07T23:12:36.547ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187742025-03-07T23:12:36.551ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
187752025-03-07T23:12:36.555ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
187762025-03-07T23:12:36.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187772025-03-07T23:12:36.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187782025-03-07T23:12:36.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187792025-03-07T23:12:36.558ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
187802025-03-07T23:12:36.558ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
187812025-03-07T23:12:36.558ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187822025-03-07T23:12:36.558ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187832025-03-07T23:12:36.559ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187842025-03-07T23:12:36.563ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
187852025-03-07T23:12:36.564ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database uri = /v1/policy
187862025-03-07T23:12:36.564ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {} } uri = /v1/policy
187872025-03-07T23:12:36.565ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Database result = Ok(()) uri = /v1/policy
187882025-03-07T23:12:36.568ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
187892025-03-07T23:12:36.572ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
187902025-03-07T23:12:36.585ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 80204 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04cb4f64-beb1-49c1-8922-48f98ef65a3f response_code = 200 uri = /v1/policy
187912025-03-07T23:12:36.586ZINFOtest_unauthorized (external client test context): client received response status = 200
187922025-03-07T23:12:36.586ZINFOtest_unauthorized: test: begin endpoint url = /v1/users
187932025-03-07T23:12:36.586ZINFOtest_unauthorized: test: privileged GET url = /v1/users
187942025-03-07T23:12:36.587ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/users
187952025-03-07T23:12:36.587ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f uri = /v1/users
187962025-03-07T23:12:36.587ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f uri = /v1/users
187972025-03-07T23:12:36.587ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/users
187982025-03-07T23:12:36.587ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187992025-03-07T23:12:36.588ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188002025-03-07T23:12:36.591ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188012025-03-07T23:12:36.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188022025-03-07T23:12:36.592ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188032025-03-07T23:12:36.596ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188042025-03-07T23:12:36.596ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188052025-03-07T23:12:36.596ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188062025-03-07T23:12:36.596ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
188072025-03-07T23:12:36.596ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188082025-03-07T23:12:36.596ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188092025-03-07T23:12:36.597ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188102025-03-07T23:12:36.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
188112025-03-07T23:12:36.600ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
188122025-03-07T23:12:36.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188132025-03-07T23:12:36.600ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188142025-03-07T23:12:36.601ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188152025-03-07T23:12:36.603ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
188162025-03-07T23:12:36.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188172025-03-07T23:12:36.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188182025-03-07T23:12:36.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188192025-03-07T23:12:36.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
188202025-03-07T23:12:36.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
188212025-03-07T23:12:36.611ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188222025-03-07T23:12:36.612ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188232025-03-07T23:12:36.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188242025-03-07T23:12:36.614ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
188252025-03-07T23:12:36.614ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
188262025-03-07T23:12:36.615ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188272025-03-07T23:12:36.615ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188282025-03-07T23:12:36.615ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188292025-03-07T23:12:36.617ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
188302025-03-07T23:12:36.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188312025-03-07T23:12:36.618ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188322025-03-07T23:12:36.619ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188332025-03-07T23:12:36.621ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
188342025-03-07T23:12:36.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
188352025-03-07T23:12:36.624ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f uri = /v1/users
188362025-03-07T23:12:36.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/users
188372025-03-07T23:12:36.625ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/users
188382025-03-07T23:12:36.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database uri = /v1/users
188392025-03-07T23:12:36.625ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f roles = RoleSet { roles: {} } uri = /v1/users
188402025-03-07T23:12:36.625ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database result = Ok(()) uri = /v1/users
188412025-03-07T23:12:36.629ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/users
188422025-03-07T23:12:36.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database uri = /v1/users
188432025-03-07T23:12:36.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f roles = RoleSet { roles: {} } uri = /v1/users
188442025-03-07T23:12:36.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database result = Ok(()) uri = /v1/users
188452025-03-07T23:12:36.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/users
188462025-03-07T23:12:36.649ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/users
188472025-03-07T23:12:36.649ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database uri = /v1/users
188482025-03-07T23:12:36.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f roles = RoleSet { roles: {} } uri = /v1/users
188492025-03-07T23:12:36.650ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f resource = Database result = Ok(()) uri = /v1/users
188502025-03-07T23:12:36.667ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 81774 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 36a7ace0-af64-49a9-913c-9d63abb6b17f response_code = 200 uri = /v1/users
188512025-03-07T23:12:36.668ZINFOtest_unauthorized (external client test context): client received response status = 200
188522025-03-07T23:12:36.669ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/users
188532025-03-07T23:12:36.669ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/users
188542025-03-07T23:12:36.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/users
188552025-03-07T23:12:36.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f74e242-861b-4bd5-8ba0-de8f607d19cb uri = /v1/users
188562025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f74e242-861b-4bd5-8ba0-de8f607d19cb uri = /v1/users
188572025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f74e242-861b-4bd5-8ba0-de8f607d19cb uri = /v1/users
188582025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f74e242-861b-4bd5-8ba0-de8f607d19cb uri = /v1/users
188592025-03-07T23:12:36.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing current silo's users: Actor required latency_us = 372 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f74e242-861b-4bd5-8ba0-de8f607d19cb response_code = 401 uri = /v1/users
188602025-03-07T23:12:36.670ZINFOtest_unauthorized (external client test context): client received response status = 401
188612025-03-07T23:12:36.670ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/users
188622025-03-07T23:12:36.670ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/users
188632025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d052e207-873b-4bcf-b0ee-0ae8d5c5f858 uri = /v1/users
188642025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d052e207-873b-4bcf-b0ee-0ae8d5c5f858 uri = /v1/users
188652025-03-07T23:12:36.670ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d052e207-873b-4bcf-b0ee-0ae8d5c5f858 uri = /v1/users
188662025-03-07T23:12:36.671ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 237 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d052e207-873b-4bcf-b0ee-0ae8d5c5f858 response_code = 401 uri = /v1/users
188672025-03-07T23:12:36.671ZINFOtest_unauthorized (external client test context): client received response status = 401
188682025-03-07T23:12:36.671ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/users
188692025-03-07T23:12:36.671ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/users
188702025-03-07T23:12:36.672ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9dc5a3db-b52a-439c-bc08-4909c0f632df uri = /v1/users
188712025-03-07T23:12:36.672ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9dc5a3db-b52a-439c-bc08-4909c0f632df uri = /v1/users
188722025-03-07T23:12:36.672ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6627:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6654:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9dc5a3db-b52a-439c-bc08-4909c0f632df uri = /v1/users
188732025-03-07T23:12:36.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1034 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9dc5a3db-b52a-439c-bc08-4909c0f632df response_code = 401 uri = /v1/users
188742025-03-07T23:12:36.672ZINFOtest_unauthorized (external client test context): client received response status = 401
188752025-03-07T23:12:36.672ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/users
188762025-03-07T23:12:36.673ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/users
188772025-03-07T23:12:36.673ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b0a6d81-88c1-4010-9ed0-1b4097972a54 uri = /v1/users
188782025-03-07T23:12:36.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b0a6d81-88c1-4010-9ed0-1b4097972a54 response_code = 405 uri = /v1/users
188792025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client received response status = 405
188802025-03-07T23:12:36.674ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/users
188812025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/users
188822025-03-07T23:12:36.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4387efa5-f010-43e1-9b46-4e32186e1519 uri = /v1/users
188832025-03-07T23:12:36.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4387efa5-f010-43e1-9b46-4e32186e1519 response_code = 405 uri = /v1/users
188842025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client received response status = 405
188852025-03-07T23:12:36.674ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/users
188862025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/users
188872025-03-07T23:12:36.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e4cccd5f-8ced-42bb-b0d9-7a854ab07928 uri = /v1/users
188882025-03-07T23:12:36.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e4cccd5f-8ced-42bb-b0d9-7a854ab07928 response_code = 405 uri = /v1/users
188892025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client received response status = 405
188902025-03-07T23:12:36.674ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/users
188912025-03-07T23:12:36.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/users
188922025-03-07T23:12:36.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 509c782b-df2c-415a-b2d2-0b185b4b0ae7 uri = /v1/users
188932025-03-07T23:12:36.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 509c782b-df2c-415a-b2d2-0b185b4b0ae7 response_code = 405 uri = /v1/users
188942025-03-07T23:12:36.675ZINFOtest_unauthorized (external client test context): client received response status = 405
188952025-03-07T23:12:36.675ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/users
188962025-03-07T23:12:36.675ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/users
188972025-03-07T23:12:36.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 94aefd30-7b1d-4961-ba5a-7efafc6efa69 uri = /v1/users
188982025-03-07T23:12:36.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 94aefd30-7b1d-4961-ba5a-7efafc6efa69 response_code = 405 uri = /v1/users
188992025-03-07T23:12:36.675ZINFOtest_unauthorized (external client test context): client received response status = 405
189002025-03-07T23:12:36.675ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/users
189012025-03-07T23:12:36.675ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/users
189022025-03-07T23:12:36.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f09ac691-9c6c-427b-8c6a-6b40d7a9b7a4 uri = /v1/users
189032025-03-07T23:12:36.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f09ac691-9c6c-427b-8c6a-6b40d7a9b7a4 response_code = 405 uri = /v1/users
189042025-03-07T23:12:36.680ZINFOtest_unauthorized (external client test context): client received response status = 405
189052025-03-07T23:12:36.681ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/users
189062025-03-07T23:12:36.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/users
189072025-03-07T23:12:36.681ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 309c964b-b46b-4506-9a56-b39d20c35f68 uri = /v1/users
189082025-03-07T23:12:36.681ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 309c964b-b46b-4506-9a56-b39d20c35f68 response_code = 405 uri = /v1/users
189092025-03-07T23:12:36.682ZINFOtest_unauthorized (external client test context): client received response status = 405
189102025-03-07T23:12:36.682ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/users
189112025-03-07T23:12:36.682ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/users
189122025-03-07T23:12:36.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 29ba246f-238f-4b6e-8370-db1ee1fe74bb uri = /v1/users
189132025-03-07T23:12:36.682ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 29ba246f-238f-4b6e-8370-db1ee1fe74bb response_code = 405 uri = /v1/users
189142025-03-07T23:12:36.682ZINFOtest_unauthorized (external client test context): client received response status = 405
189152025-03-07T23:12:36.682ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/users
189162025-03-07T23:12:36.682ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/users
189172025-03-07T23:12:36.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe47474-d43d-46f3-b7cc-8d1a3279ec68 uri = /v1/users
189182025-03-07T23:12:36.683ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe47474-d43d-46f3-b7cc-8d1a3279ec68 response_code = 405 uri = /v1/users
189192025-03-07T23:12:36.683ZINFOtest_unauthorized (external client test context): client received response status = 405
189202025-03-07T23:12:36.683ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/users
189212025-03-07T23:12:36.683ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/users
189222025-03-07T23:12:36.683ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 88736bd4-2496-4f1a-b0cc-8f2c567503fe uri = /v1/users
189232025-03-07T23:12:36.683ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 88736bd4-2496-4f1a-b0cc-8f2c567503fe response_code = 405 uri = /v1/users
189242025-03-07T23:12:36.683ZINFOtest_unauthorized (external client test context): client received response status = 405
189252025-03-07T23:12:36.683ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/users
189262025-03-07T23:12:36.683ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/users
189272025-03-07T23:12:36.683ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fbf6824b-ae3a-417b-b9eb-49667f2a5b32 uri = /v1/users
189282025-03-07T23:12:36.684ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fbf6824b-ae3a-417b-b9eb-49667f2a5b32 response_code = 405 uri = /v1/users
189292025-03-07T23:12:36.684ZINFOtest_unauthorized (external client test context): client received response status = 405
189302025-03-07T23:12:36.685ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/users
189312025-03-07T23:12:36.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/users
189322025-03-07T23:12:36.685ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5de3f152-64a3-402a-98a5-46a9d24d2a2b uri = /v1/users
189332025-03-07T23:12:36.685ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5de3f152-64a3-402a-98a5-46a9d24d2a2b response_code = 405 uri = /v1/users
189342025-03-07T23:12:36.685ZINFOtest_unauthorized (external client test context): client received response status = 405
189352025-03-07T23:12:36.685ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/users
189362025-03-07T23:12:36.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/users
189372025-03-07T23:12:36.685ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1a7b96ac-f48b-4ff8-b25f-808315bbc5b2 uri = /v1/users
189382025-03-07T23:12:36.685ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1a7b96ac-f48b-4ff8-b25f-808315bbc5b2 response_code = 405 uri = /v1/users
189392025-03-07T23:12:36.685ZINFOtest_unauthorized (external client test context): client received response status = 405
189402025-03-07T23:12:36.685ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/users
189412025-03-07T23:12:36.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/users
189422025-03-07T23:12:36.685ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41f9db2c-fb28-4c01-84b3-bade53b7c720 uri = /v1/users
189432025-03-07T23:12:36.687ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41f9db2c-fb28-4c01-84b3-bade53b7c720 response_code = 405 uri = /v1/users
189442025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client received response status = 405
189452025-03-07T23:12:36.688ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/users
189462025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/users
189472025-03-07T23:12:36.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8619528d-fc99-4207-96b3-b9aeb4935789 uri = /v1/users
189482025-03-07T23:12:36.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8619528d-fc99-4207-96b3-b9aeb4935789 response_code = 405 uri = /v1/users
189492025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client received response status = 405
189502025-03-07T23:12:36.688ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/users
189512025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/users
189522025-03-07T23:12:36.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8068012c-1dad-42c4-bd91-8d7796b9b362 uri = /v1/users
189532025-03-07T23:12:36.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8068012c-1dad-42c4-bd91-8d7796b9b362 response_code = 405 uri = /v1/users
189542025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client received response status = 405
189552025-03-07T23:12:36.688ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/users
189562025-03-07T23:12:36.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/users
189572025-03-07T23:12:36.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad uri = /v1/users
189582025-03-07T23:12:36.688ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad uri = /v1/users
189592025-03-07T23:12:36.688ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/users
189602025-03-07T23:12:36.688ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189612025-03-07T23:12:36.688ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189622025-03-07T23:12:36.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189632025-03-07T23:12:36.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189642025-03-07T23:12:36.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189652025-03-07T23:12:36.691ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189662025-03-07T23:12:36.694ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
189672025-03-07T23:12:36.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
189682025-03-07T23:12:36.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189692025-03-07T23:12:36.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189702025-03-07T23:12:36.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189712025-03-07T23:12:36.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
189722025-03-07T23:12:36.696ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189732025-03-07T23:12:36.696ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189742025-03-07T23:12:36.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189752025-03-07T23:12:36.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
189762025-03-07T23:12:36.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
189772025-03-07T23:12:36.702ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189782025-03-07T23:12:36.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189792025-03-07T23:12:36.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189802025-03-07T23:12:36.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
189812025-03-07T23:12:36.707ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
189822025-03-07T23:12:36.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189832025-03-07T23:12:36.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189842025-03-07T23:12:36.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189852025-03-07T23:12:36.710ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
189862025-03-07T23:12:36.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189872025-03-07T23:12:36.711ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189882025-03-07T23:12:36.711ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189892025-03-07T23:12:36.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
189902025-03-07T23:12:36.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
189912025-03-07T23:12:36.719ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad uri = /v1/users
189922025-03-07T23:12:36.719ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/users
189932025-03-07T23:12:36.719ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/users
189942025-03-07T23:12:36.719ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database uri = /v1/users
189952025-03-07T23:12:36.719ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad roles = RoleSet { roles: {} } uri = /v1/users
189962025-03-07T23:12:36.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database result = Ok(()) uri = /v1/users
189972025-03-07T23:12:36.724ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/users
189982025-03-07T23:12:36.724ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database uri = /v1/users
189992025-03-07T23:12:36.724ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad roles = RoleSet { roles: {} } uri = /v1/users
190002025-03-07T23:12:36.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database result = Ok(()) uri = /v1/users
190012025-03-07T23:12:36.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/users
190022025-03-07T23:12:36.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/users
190032025-03-07T23:12:36.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database uri = /v1/users
190042025-03-07T23:12:36.736ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad roles = RoleSet { roles: {} } uri = /v1/users
190052025-03-07T23:12:36.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad resource = Database result = Ok(()) uri = /v1/users
190062025-03-07T23:12:36.742ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 56735 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e3d2c745-2196-4f1d-a125-ff82ee3c74ad response_code = 200 uri = /v1/users
190072025-03-07T23:12:36.743ZINFOtest_unauthorized (external client test context): client received response status = 200
190082025-03-07T23:12:36.743ZINFOtest_unauthorized: test: begin endpoint url = /v1/groups
190092025-03-07T23:12:36.743ZINFOtest_unauthorized: test: privileged GET url = /v1/groups
190102025-03-07T23:12:36.743ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups
190112025-03-07T23:12:36.744ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc uri = /v1/groups
190122025-03-07T23:12:36.745ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc uri = /v1/groups
190132025-03-07T23:12:36.745ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/groups
190142025-03-07T23:12:36.745ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190152025-03-07T23:12:36.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190162025-03-07T23:12:36.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190172025-03-07T23:12:36.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190182025-03-07T23:12:36.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190192025-03-07T23:12:36.749ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190202025-03-07T23:12:36.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
190212025-03-07T23:12:36.751ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
190222025-03-07T23:12:36.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190232025-03-07T23:12:36.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190242025-03-07T23:12:36.752ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190252025-03-07T23:12:36.754ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
190262025-03-07T23:12:36.754ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190272025-03-07T23:12:36.754ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190282025-03-07T23:12:36.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190292025-03-07T23:12:36.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
190302025-03-07T23:12:36.761ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
190312025-03-07T23:12:36.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190322025-03-07T23:12:36.762ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190332025-03-07T23:12:36.762ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190342025-03-07T23:12:36.771ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
190352025-03-07T23:12:36.771ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
190362025-03-07T23:12:36.771ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190372025-03-07T23:12:36.771ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190382025-03-07T23:12:36.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190392025-03-07T23:12:36.778ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
190402025-03-07T23:12:36.778ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
190412025-03-07T23:12:36.778ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
190422025-03-07T23:12:36.779ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
190432025-03-07T23:12:36.783ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
190442025-03-07T23:12:36.787ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
190452025-03-07T23:12:36.787ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc uri = /v1/groups
190462025-03-07T23:12:36.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/groups
190472025-03-07T23:12:36.787ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/groups
190482025-03-07T23:12:36.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database uri = /v1/groups
190492025-03-07T23:12:36.788ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc roles = RoleSet { roles: {} } uri = /v1/groups
190502025-03-07T23:12:36.788ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database result = Ok(()) uri = /v1/groups
190512025-03-07T23:12:36.800ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/groups
190522025-03-07T23:12:36.800ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database uri = /v1/groups
190532025-03-07T23:12:36.800ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc roles = RoleSet { roles: {} } uri = /v1/groups
190542025-03-07T23:12:36.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database result = Ok(()) uri = /v1/groups
190552025-03-07T23:12:36.806ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/groups
190562025-03-07T23:12:36.809ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/groups
190572025-03-07T23:12:36.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database uri = /v1/groups
190582025-03-07T23:12:36.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc roles = RoleSet { roles: {} } uri = /v1/groups
190592025-03-07T23:12:36.810ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc resource = Database result = Ok(()) uri = /v1/groups
190602025-03-07T23:12:36.842ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 98528 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eec7cb58-bf23-4700-9c24-96e29dec29cc response_code = 200 uri = /v1/groups
190612025-03-07T23:12:36.843ZINFOtest_unauthorized (external client test context): client received response status = 200
190622025-03-07T23:12:36.843ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/groups
190632025-03-07T23:12:36.843ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/groups
190642025-03-07T23:12:36.843ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups
190652025-03-07T23:12:36.843ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d0d26486-213d-4bc9-89a5-ebce51fa369e uri = /v1/groups
190662025-03-07T23:12:36.844ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d0d26486-213d-4bc9-89a5-ebce51fa369e uri = /v1/groups
190672025-03-07T23:12:36.844ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d0d26486-213d-4bc9-89a5-ebce51fa369e uri = /v1/groups
190682025-03-07T23:12:36.844ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d0d26486-213d-4bc9-89a5-ebce51fa369e uri = /v1/groups
190692025-03-07T23:12:36.844ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing current silo's groups: Actor required latency_us = 663 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d0d26486-213d-4bc9-89a5-ebce51fa369e response_code = 401 uri = /v1/groups
190702025-03-07T23:12:36.845ZINFOtest_unauthorized (external client test context): client received response status = 401
190712025-03-07T23:12:36.845ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/groups
190722025-03-07T23:12:36.845ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups
190732025-03-07T23:12:36.845ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49b64fda-ddcc-4af8-a812-20bae8b67453 uri = /v1/groups
190742025-03-07T23:12:36.845ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49b64fda-ddcc-4af8-a812-20bae8b67453 uri = /v1/groups
190752025-03-07T23:12:36.846ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49b64fda-ddcc-4af8-a812-20bae8b67453 uri = /v1/groups
190762025-03-07T23:12:36.846ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 204 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49b64fda-ddcc-4af8-a812-20bae8b67453 response_code = 401 uri = /v1/groups
190772025-03-07T23:12:36.846ZINFOtest_unauthorized (external client test context): client received response status = 401
190782025-03-07T23:12:36.846ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/groups
190792025-03-07T23:12:36.846ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups
190802025-03-07T23:12:36.846ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d3f516db-b092-4e38-98c9-6d1f13374e32 uri = /v1/groups
190812025-03-07T23:12:36.846ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d3f516db-b092-4e38-98c9-6d1f13374e32 uri = /v1/groups
190822025-03-07T23:12:36.847ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6669:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6686:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d3f516db-b092-4e38-98c9-6d1f13374e32 uri = /v1/groups
190832025-03-07T23:12:36.847ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1019 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d3f516db-b092-4e38-98c9-6d1f13374e32 response_code = 401 uri = /v1/groups
190842025-03-07T23:12:36.847ZINFOtest_unauthorized (external client test context): client received response status = 401
190852025-03-07T23:12:36.847ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/groups
190862025-03-07T23:12:36.847ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups
190872025-03-07T23:12:36.847ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 563bdb39-a127-4352-826f-f2d39541d255 uri = /v1/groups
190882025-03-07T23:12:36.847ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 563bdb39-a127-4352-826f-f2d39541d255 response_code = 405 uri = /v1/groups
190892025-03-07T23:12:36.847ZINFOtest_unauthorized (external client test context): client received response status = 405
190902025-03-07T23:12:36.848ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/groups
190912025-03-07T23:12:36.848ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups
190922025-03-07T23:12:36.848ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dc56b67f-42a0-4f95-981a-84475453d5c6 uri = /v1/groups
190932025-03-07T23:12:36.848ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 98 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dc56b67f-42a0-4f95-981a-84475453d5c6 response_code = 405 uri = /v1/groups
190942025-03-07T23:12:36.848ZINFOtest_unauthorized (external client test context): client received response status = 405
190952025-03-07T23:12:36.848ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/groups
190962025-03-07T23:12:36.848ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups
190972025-03-07T23:12:36.848ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 88783d8b-f976-47b7-a03d-3b1889187eb6 uri = /v1/groups
190982025-03-07T23:12:36.849ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 88783d8b-f976-47b7-a03d-3b1889187eb6 response_code = 405 uri = /v1/groups
190992025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client received response status = 405
191002025-03-07T23:12:36.850ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/groups
191012025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups
191022025-03-07T23:12:36.850ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = addedc39-bc4a-40c0-98f4-042decf75409 uri = /v1/groups
191032025-03-07T23:12:36.850ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = addedc39-bc4a-40c0-98f4-042decf75409 response_code = 405 uri = /v1/groups
191042025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client received response status = 405
191052025-03-07T23:12:36.850ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/groups
191062025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups
191072025-03-07T23:12:36.850ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7d47c8a8-b0e5-4802-9a51-6ed9cf61242e uri = /v1/groups
191082025-03-07T23:12:36.850ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7d47c8a8-b0e5-4802-9a51-6ed9cf61242e response_code = 405 uri = /v1/groups
191092025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client received response status = 405
191102025-03-07T23:12:36.850ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/groups
191112025-03-07T23:12:36.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups
191122025-03-07T23:12:36.851ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6784a7a6-7d20-422b-806d-c45df66acf8d uri = /v1/groups
191132025-03-07T23:12:36.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 121 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6784a7a6-7d20-422b-806d-c45df66acf8d response_code = 405 uri = /v1/groups
191142025-03-07T23:12:36.852ZINFOtest_unauthorized (external client test context): client received response status = 405
191152025-03-07T23:12:36.852ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/groups
191162025-03-07T23:12:36.852ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups
191172025-03-07T23:12:36.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4d9f66fb-234a-41d1-9e00-a2da63712e34 uri = /v1/groups
191182025-03-07T23:12:36.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4d9f66fb-234a-41d1-9e00-a2da63712e34 response_code = 405 uri = /v1/groups
191192025-03-07T23:12:36.852ZINFOtest_unauthorized (external client test context): client received response status = 405
191202025-03-07T23:12:36.852ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/groups
191212025-03-07T23:12:36.852ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups
191222025-03-07T23:12:36.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3157681b-8323-414c-9fc8-7fe541ea8731 uri = /v1/groups
191232025-03-07T23:12:36.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3157681b-8323-414c-9fc8-7fe541ea8731 response_code = 405 uri = /v1/groups
191242025-03-07T23:12:36.852ZINFOtest_unauthorized (external client test context): client received response status = 405
191252025-03-07T23:12:36.853ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/groups
191262025-03-07T23:12:36.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups
191272025-03-07T23:12:36.853ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 01b2ab11-73c2-44e6-9a25-30a6a72a266e uri = /v1/groups
191282025-03-07T23:12:36.853ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 01b2ab11-73c2-44e6-9a25-30a6a72a266e response_code = 405 uri = /v1/groups
191292025-03-07T23:12:36.853ZINFOtest_unauthorized (external client test context): client received response status = 405
191302025-03-07T23:12:36.853ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/groups
191312025-03-07T23:12:36.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups
191322025-03-07T23:12:36.853ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5875f1d0-31cb-4728-991e-af0f48d8dc58 uri = /v1/groups
191332025-03-07T23:12:36.853ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5875f1d0-31cb-4728-991e-af0f48d8dc58 response_code = 405 uri = /v1/groups
191342025-03-07T23:12:36.853ZINFOtest_unauthorized (external client test context): client received response status = 405
191352025-03-07T23:12:36.853ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/groups
191362025-03-07T23:12:36.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups
191372025-03-07T23:12:36.853ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6d13588-e009-4fe6-9c34-808d1c53d545 uri = /v1/groups
191382025-03-07T23:12:36.854ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 176 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6d13588-e009-4fe6-9c34-808d1c53d545 response_code = 405 uri = /v1/groups
191392025-03-07T23:12:36.854ZINFOtest_unauthorized (external client test context): client received response status = 405
191402025-03-07T23:12:36.854ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/groups
191412025-03-07T23:12:36.854ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups
191422025-03-07T23:12:36.854ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca09b081-56c6-4ef6-bae0-0d5f00156a99 uri = /v1/groups
191432025-03-07T23:12:36.855ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca09b081-56c6-4ef6-bae0-0d5f00156a99 response_code = 405 uri = /v1/groups
191442025-03-07T23:12:36.856ZINFOtest_unauthorized (external client test context): client received response status = 405
191452025-03-07T23:12:36.856ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/groups
191462025-03-07T23:12:36.856ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups
191472025-03-07T23:12:36.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0b084c56-3520-43fe-b2b7-77f0d9e2035f uri = /v1/groups
191482025-03-07T23:12:36.856ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0b084c56-3520-43fe-b2b7-77f0d9e2035f response_code = 405 uri = /v1/groups
191492025-03-07T23:12:36.856ZINFOtest_unauthorized (external client test context): client received response status = 405
191502025-03-07T23:12:36.856ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/groups
191512025-03-07T23:12:36.856ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups
191522025-03-07T23:12:36.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c259c9d7-8010-419f-80f8-08665bcb7056 uri = /v1/groups
191532025-03-07T23:12:36.856ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c259c9d7-8010-419f-80f8-08665bcb7056 response_code = 405 uri = /v1/groups
191542025-03-07T23:12:36.856ZINFOtest_unauthorized (external client test context): client received response status = 405
191552025-03-07T23:12:36.856ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/groups
191562025-03-07T23:12:36.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups
191572025-03-07T23:12:36.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c6f03038-dff9-4cbb-964f-77bd8cf287bb uri = /v1/groups
191582025-03-07T23:12:36.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c6f03038-dff9-4cbb-964f-77bd8cf287bb response_code = 405 uri = /v1/groups
191592025-03-07T23:12:36.857ZINFOtest_unauthorized (external client test context): client received response status = 405
191602025-03-07T23:12:36.857ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/groups
191612025-03-07T23:12:36.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups
191622025-03-07T23:12:36.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3078095f-f5d2-4409-a5dd-3615bb6df48a uri = /v1/groups
191632025-03-07T23:12:36.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 95 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3078095f-f5d2-4409-a5dd-3615bb6df48a response_code = 405 uri = /v1/groups
191642025-03-07T23:12:36.857ZINFOtest_unauthorized (external client test context): client received response status = 405
191652025-03-07T23:12:36.857ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/groups
191662025-03-07T23:12:36.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups
191672025-03-07T23:12:36.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e uri = /v1/groups
191682025-03-07T23:12:36.857ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e uri = /v1/groups
191692025-03-07T23:12:36.857ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/groups
191702025-03-07T23:12:36.857ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191712025-03-07T23:12:36.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191722025-03-07T23:12:36.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191732025-03-07T23:12:36.864ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191742025-03-07T23:12:36.864ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191752025-03-07T23:12:36.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191762025-03-07T23:12:36.865ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
191772025-03-07T23:12:36.865ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191782025-03-07T23:12:36.865ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191792025-03-07T23:12:36.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191802025-03-07T23:12:36.867ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191812025-03-07T23:12:36.871ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191822025-03-07T23:12:36.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191832025-03-07T23:12:36.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191842025-03-07T23:12:36.873ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191852025-03-07T23:12:36.877ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
191862025-03-07T23:12:36.881ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
191872025-03-07T23:12:36.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191882025-03-07T23:12:36.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191892025-03-07T23:12:36.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191902025-03-07T23:12:36.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
191912025-03-07T23:12:36.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191922025-03-07T23:12:36.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191932025-03-07T23:12:36.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191942025-03-07T23:12:36.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191952025-03-07T23:12:36.890ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191962025-03-07T23:12:36.890ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191972025-03-07T23:12:36.890ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191982025-03-07T23:12:36.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191992025-03-07T23:12:36.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
192002025-03-07T23:12:36.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
192012025-03-07T23:12:36.898ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e uri = /v1/groups
192022025-03-07T23:12:36.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/groups
192032025-03-07T23:12:36.898ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/groups
192042025-03-07T23:12:36.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database uri = /v1/groups
192052025-03-07T23:12:36.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e roles = RoleSet { roles: {} } uri = /v1/groups
192062025-03-07T23:12:36.899ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database result = Ok(()) uri = /v1/groups
192072025-03-07T23:12:36.903ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/groups
192082025-03-07T23:12:36.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database uri = /v1/groups
192092025-03-07T23:12:36.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e roles = RoleSet { roles: {} } uri = /v1/groups
192102025-03-07T23:12:36.905ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database result = Ok(()) uri = /v1/groups
192112025-03-07T23:12:36.908ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/groups
192122025-03-07T23:12:36.930ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/groups
192132025-03-07T23:12:36.930ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database uri = /v1/groups
192142025-03-07T23:12:36.930ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e roles = RoleSet { roles: {} } uri = /v1/groups
192152025-03-07T23:12:36.931ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e resource = Database result = Ok(()) uri = /v1/groups
192162025-03-07T23:12:36.934ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 77155 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f24adb75-1d10-4212-916a-e6f5a72b7c6e response_code = 200 uri = /v1/groups
192172025-03-07T23:12:36.935ZINFOtest_unauthorized (external client test context): client received response status = 200
192182025-03-07T23:12:36.935ZINFOtest_unauthorized: test: begin endpoint url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192192025-03-07T23:12:36.936ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192202025-03-07T23:12:36.936ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192212025-03-07T23:12:36.936ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192222025-03-07T23:12:36.936ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192232025-03-07T23:12:36.936ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192242025-03-07T23:12:36.937ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192252025-03-07T23:12:36.937ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192262025-03-07T23:12:36.937ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192272025-03-07T23:12:36.937ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 resource = Database uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192282025-03-07T23:12:36.937ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 roles = RoleSet { roles: {} } uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192292025-03-07T23:12:36.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192302025-03-07T23:12:36.937ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1229 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = dc4fbcea-bbd4-4a00-87a1-217395c86cc7 response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192312025-03-07T23:12:36.937ZINFOtest_unauthorized (external client test context): client received response status = 401
192322025-03-07T23:12:36.937ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192332025-03-07T23:12:36.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192342025-03-07T23:12:36.938ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c675c25e-fc9d-45c2-9007-614605756a91 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192352025-03-07T23:12:36.938ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c675c25e-fc9d-45c2-9007-614605756a91 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192362025-03-07T23:12:36.938ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c675c25e-fc9d-45c2-9007-614605756a91 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192372025-03-07T23:12:36.938ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 616 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c675c25e-fc9d-45c2-9007-614605756a91 response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192382025-03-07T23:12:36.939ZINFOtest_unauthorized (external client test context): client received response status = 401
192392025-03-07T23:12:36.939ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192402025-03-07T23:12:36.939ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192412025-03-07T23:12:36.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3134903f-221d-4e15-ab2d-8196f04f774b uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192422025-03-07T23:12:36.940ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3134903f-221d-4e15-ab2d-8196f04f774b uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192432025-03-07T23:12:36.942ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6698:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6707:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3134903f-221d-4e15-ab2d-8196f04f774b uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192442025-03-07T23:12:36.942ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2503 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3134903f-221d-4e15-ab2d-8196f04f774b response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192452025-03-07T23:12:36.943ZINFOtest_unauthorized (external client test context): client received response status = 401
192462025-03-07T23:12:36.943ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192472025-03-07T23:12:36.943ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192482025-03-07T23:12:36.943ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 087bef42-ea7f-489c-b271-992647f1f113 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192492025-03-07T23:12:36.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 199 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 087bef42-ea7f-489c-b271-992647f1f113 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192502025-03-07T23:12:36.944ZINFOtest_unauthorized (external client test context): client received response status = 405
192512025-03-07T23:12:36.944ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192522025-03-07T23:12:36.944ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192532025-03-07T23:12:36.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 95dffb89-bd72-4d0b-85de-af7148c173c4 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192542025-03-07T23:12:36.945ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 174 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 95dffb89-bd72-4d0b-85de-af7148c173c4 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192552025-03-07T23:12:36.945ZINFOtest_unauthorized (external client test context): client received response status = 405
192562025-03-07T23:12:36.946ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192572025-03-07T23:12:36.946ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192582025-03-07T23:12:36.946ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 74f4e956-016b-44a5-8867-ab2c5a478110 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192592025-03-07T23:12:36.946ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 74f4e956-016b-44a5-8867-ab2c5a478110 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192602025-03-07T23:12:36.946ZINFOtest_unauthorized (external client test context): client received response status = 405
192612025-03-07T23:12:36.946ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192622025-03-07T23:12:36.946ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192632025-03-07T23:12:36.947ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d7b537aa-bdfe-498e-8039-eb3a7a441456 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192642025-03-07T23:12:36.947ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d7b537aa-bdfe-498e-8039-eb3a7a441456 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192652025-03-07T23:12:36.948ZINFOtest_unauthorized (external client test context): client received response status = 405
192662025-03-07T23:12:36.948ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192672025-03-07T23:12:36.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192682025-03-07T23:12:36.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dc4dc9be-4064-41f0-b0a4-bf08299bd8a7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192692025-03-07T23:12:36.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dc4dc9be-4064-41f0-b0a4-bf08299bd8a7 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192702025-03-07T23:12:36.948ZINFOtest_unauthorized (external client test context): client received response status = 405
192712025-03-07T23:12:36.948ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192722025-03-07T23:12:36.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192732025-03-07T23:12:36.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 443fd8cc-10ee-4892-8827-1e81278de106 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192742025-03-07T23:12:36.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 443fd8cc-10ee-4892-8827-1e81278de106 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192752025-03-07T23:12:36.950ZINFOtest_unauthorized (external client test context): client received response status = 405
192762025-03-07T23:12:36.950ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192772025-03-07T23:12:36.950ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192782025-03-07T23:12:36.950ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 955cabf0-bfd1-44fb-9721-10107336403f uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192792025-03-07T23:12:36.950ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 182 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 955cabf0-bfd1-44fb-9721-10107336403f response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192802025-03-07T23:12:36.951ZINFOtest_unauthorized (external client test context): client received response status = 405
192812025-03-07T23:12:36.951ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192822025-03-07T23:12:36.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192832025-03-07T23:12:36.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c9ac14f3-2597-466e-ae54-30a7adbee3e7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192842025-03-07T23:12:36.952ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c9ac14f3-2597-466e-ae54-30a7adbee3e7 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192852025-03-07T23:12:36.952ZINFOtest_unauthorized (external client test context): client received response status = 405
192862025-03-07T23:12:36.952ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192872025-03-07T23:12:36.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192882025-03-07T23:12:36.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3914e91a-359d-4d34-b614-823006fc8014 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192892025-03-07T23:12:36.952ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3914e91a-359d-4d34-b614-823006fc8014 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192902025-03-07T23:12:36.952ZINFOtest_unauthorized (external client test context): client received response status = 405
192912025-03-07T23:12:36.952ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192922025-03-07T23:12:36.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192932025-03-07T23:12:36.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 25858500-449c-442c-afd9-8edecc033022 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192942025-03-07T23:12:36.953ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 25858500-449c-442c-afd9-8edecc033022 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192952025-03-07T23:12:36.953ZINFOtest_unauthorized (external client test context): client received response status = 405
192962025-03-07T23:12:36.953ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192972025-03-07T23:12:36.953ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192982025-03-07T23:12:36.953ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = db77fc68-1c35-45cf-9913-9ddca5162789 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
192992025-03-07T23:12:36.953ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 79 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = db77fc68-1c35-45cf-9913-9ddca5162789 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193002025-03-07T23:12:36.953ZINFOtest_unauthorized (external client test context): client received response status = 405
193012025-03-07T23:12:36.953ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193022025-03-07T23:12:36.954ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193032025-03-07T23:12:36.954ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1b03a438-dad9-427e-a85a-cb9ced436764 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193042025-03-07T23:12:36.955ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1b03a438-dad9-427e-a85a-cb9ced436764 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193052025-03-07T23:12:36.955ZINFOtest_unauthorized (external client test context): client received response status = 405
193062025-03-07T23:12:36.955ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193072025-03-07T23:12:36.955ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193082025-03-07T23:12:36.955ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9871a4ed-e897-47fd-9915-7e1d217dd307 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193092025-03-07T23:12:36.955ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9871a4ed-e897-47fd-9915-7e1d217dd307 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193102025-03-07T23:12:36.955ZINFOtest_unauthorized (external client test context): client received response status = 405
193112025-03-07T23:12:36.955ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193122025-03-07T23:12:36.955ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193132025-03-07T23:12:36.956ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2be06814-5c19-408d-9b82-2e468ae8e1f9 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193142025-03-07T23:12:36.956ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 172 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2be06814-5c19-408d-9b82-2e468ae8e1f9 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193152025-03-07T23:12:36.956ZINFOtest_unauthorized (external client test context): client received response status = 405
193162025-03-07T23:12:36.956ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193172025-03-07T23:12:36.956ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193182025-03-07T23:12:36.957ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6db07651-25d1-4f4b-b7b4-4bf96e59c49d uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193192025-03-07T23:12:36.957ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6db07651-25d1-4f4b-b7b4-4bf96e59c49d response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193202025-03-07T23:12:36.957ZINFOtest_unauthorized (external client test context): client received response status = 405
193212025-03-07T23:12:36.957ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193222025-03-07T23:12:36.957ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193232025-03-07T23:12:36.957ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a486e29a-81ac-423b-ae7a-eb9493bdc051 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193242025-03-07T23:12:36.957ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 179 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a486e29a-81ac-423b-ae7a-eb9493bdc051 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193252025-03-07T23:12:36.958ZINFOtest_unauthorized (external client test context): client received response status = 405
193262025-03-07T23:12:36.958ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193272025-03-07T23:12:36.958ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/users?silo=default-silo
193282025-03-07T23:12:36.958ZINFOtest_unauthorized: test: privileged GET url = /v1/system/users?silo=default-silo
193292025-03-07T23:12:36.958ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
193302025-03-07T23:12:36.959ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 uri = /v1/system/users?silo=default-silo
193312025-03-07T23:12:36.960ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 uri = /v1/system/users?silo=default-silo
193322025-03-07T23:12:36.960ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users?silo=default-silo
193332025-03-07T23:12:36.960ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193342025-03-07T23:12:36.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193352025-03-07T23:12:36.961ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193362025-03-07T23:12:36.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193372025-03-07T23:12:36.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193382025-03-07T23:12:36.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193392025-03-07T23:12:36.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
193402025-03-07T23:12:36.967ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
193412025-03-07T23:12:36.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193422025-03-07T23:12:36.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193432025-03-07T23:12:36.970ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193442025-03-07T23:12:36.972ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
193452025-03-07T23:12:36.972ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193462025-03-07T23:12:36.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193472025-03-07T23:12:36.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193482025-03-07T23:12:36.983ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
193492025-03-07T23:12:36.983ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
193502025-03-07T23:12:36.983ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193512025-03-07T23:12:36.983ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193522025-03-07T23:12:36.999ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193532025-03-07T23:12:37.008ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
193542025-03-07T23:12:37.008ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
193552025-03-07T23:12:37.008ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193562025-03-07T23:12:37.008ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193572025-03-07T23:12:37.008ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193582025-03-07T23:12:37.010ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
193592025-03-07T23:12:37.010ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193602025-03-07T23:12:37.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193612025-03-07T23:12:37.012ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193622025-03-07T23:12:37.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
193632025-03-07T23:12:37.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
193642025-03-07T23:12:37.019ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 uri = /v1/system/users?silo=default-silo
193652025-03-07T23:12:37.019ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193662025-03-07T23:12:37.019ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193672025-03-07T23:12:37.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193682025-03-07T23:12:37.021ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users?silo=default-silo
193692025-03-07T23:12:37.021ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
193702025-03-07T23:12:37.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193712025-03-07T23:12:37.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193722025-03-07T23:12:37.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193732025-03-07T23:12:37.025ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
193742025-03-07T23:12:37.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193752025-03-07T23:12:37.026ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193762025-03-07T23:12:37.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193772025-03-07T23:12:37.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
193782025-03-07T23:12:37.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users?silo=default-silo
193792025-03-07T23:12:37.033ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/users?silo=default-silo
193802025-03-07T23:12:37.033ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
193812025-03-07T23:12:37.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193822025-03-07T23:12:37.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193832025-03-07T23:12:37.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193842025-03-07T23:12:37.038ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
193852025-03-07T23:12:37.039ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193862025-03-07T23:12:37.039ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193872025-03-07T23:12:37.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193882025-03-07T23:12:37.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
193892025-03-07T23:12:37.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/users?silo=default-silo
193902025-03-07T23:12:37.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database uri = /v1/system/users?silo=default-silo
193912025-03-07T23:12:37.049ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
193922025-03-07T23:12:37.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
193932025-03-07T23:12:37.052ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 93682 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 100b2dc7-4c1c-4c34-84c1-870975f899f1 response_code = 200 uri = /v1/system/users?silo=default-silo
193942025-03-07T23:12:37.053ZINFOtest_unauthorized (external client test context): client received response status = 200
193952025-03-07T23:12:37.053ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/users?silo=default-silo
193962025-03-07T23:12:37.054ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/users?silo=default-silo
193972025-03-07T23:12:37.054ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
193982025-03-07T23:12:37.054ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 uri = /v1/system/users?silo=default-silo
193992025-03-07T23:12:37.054ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 uri = /v1/system/users?silo=default-silo
194002025-03-07T23:12:37.054ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 uri = /v1/system/users?silo=default-silo
194012025-03-07T23:12:37.054ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 uri = /v1/system/users?silo=default-silo
194022025-03-07T23:12:37.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 resource = Database uri = /v1/system/users?silo=default-silo
194032025-03-07T23:12:37.055ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
194042025-03-07T23:12:37.055ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/users?silo=default-silo
194052025-03-07T23:12:37.055ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1129 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a42665ff-dfbe-412d-93fa-e881127ef557 response_code = 401 uri = /v1/system/users?silo=default-silo
194062025-03-07T23:12:37.055ZINFOtest_unauthorized (external client test context): client received response status = 401
194072025-03-07T23:12:37.056ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/users?silo=default-silo
194082025-03-07T23:12:37.056ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194092025-03-07T23:12:37.056ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a8a6c96-b60f-44f9-a54d-45288b271d95 uri = /v1/system/users?silo=default-silo
194102025-03-07T23:12:37.056ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a8a6c96-b60f-44f9-a54d-45288b271d95 uri = /v1/system/users?silo=default-silo
194112025-03-07T23:12:37.056ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a8a6c96-b60f-44f9-a54d-45288b271d95 uri = /v1/system/users?silo=default-silo
194122025-03-07T23:12:37.056ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 211 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a8a6c96-b60f-44f9-a54d-45288b271d95 response_code = 401 uri = /v1/system/users?silo=default-silo
194132025-03-07T23:12:37.056ZINFOtest_unauthorized (external client test context): client received response status = 401
194142025-03-07T23:12:37.056ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/users?silo=default-silo
194152025-03-07T23:12:37.056ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194162025-03-07T23:12:37.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a46107b-a4a0-4818-abec-fd74c20b681f uri = /v1/system/users?silo=default-silo
194172025-03-07T23:12:37.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a46107b-a4a0-4818-abec-fd74c20b681f uri = /v1/system/users?silo=default-silo
194182025-03-07T23:12:37.058ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:586:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:609:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a46107b-a4a0-4818-abec-fd74c20b681f uri = /v1/system/users?silo=default-silo
194192025-03-07T23:12:37.058ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1009 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a46107b-a4a0-4818-abec-fd74c20b681f response_code = 401 uri = /v1/system/users?silo=default-silo
194202025-03-07T23:12:37.058ZINFOtest_unauthorized (external client test context): client received response status = 401
194212025-03-07T23:12:37.058ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/users?silo=default-silo
194222025-03-07T23:12:37.058ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194232025-03-07T23:12:37.058ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f8d4a3cd-c33a-4578-a1ff-45fc28cadc73 uri = /v1/system/users?silo=default-silo
194242025-03-07T23:12:37.059ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f8d4a3cd-c33a-4578-a1ff-45fc28cadc73 response_code = 405 uri = /v1/system/users?silo=default-silo
194252025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client received response status = 405
194262025-03-07T23:12:37.060ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/users?silo=default-silo
194272025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194282025-03-07T23:12:37.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d6d95bca-b427-4b9a-aeae-886521b0a889 uri = /v1/system/users?silo=default-silo
194292025-03-07T23:12:37.060ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d6d95bca-b427-4b9a-aeae-886521b0a889 response_code = 405 uri = /v1/system/users?silo=default-silo
194302025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client received response status = 405
194312025-03-07T23:12:37.060ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/users?silo=default-silo
194322025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194332025-03-07T23:12:37.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8cdf638e-58c1-40fa-ab36-5b624f962fd9 uri = /v1/system/users?silo=default-silo
194342025-03-07T23:12:37.060ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 132 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8cdf638e-58c1-40fa-ab36-5b624f962fd9 response_code = 405 uri = /v1/system/users?silo=default-silo
194352025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client received response status = 405
194362025-03-07T23:12:37.060ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/users?silo=default-silo
194372025-03-07T23:12:37.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194382025-03-07T23:12:37.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e4254900-6e6c-41a4-870d-ab0df9b223b9 uri = /v1/system/users?silo=default-silo
194392025-03-07T23:12:37.061ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e4254900-6e6c-41a4-870d-ab0df9b223b9 response_code = 405 uri = /v1/system/users?silo=default-silo
194402025-03-07T23:12:37.061ZINFOtest_unauthorized (external client test context): client received response status = 405
194412025-03-07T23:12:37.062ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/users?silo=default-silo
194422025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194432025-03-07T23:12:37.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b340666b-22be-43e5-9560-497364112a58 uri = /v1/system/users?silo=default-silo
194442025-03-07T23:12:37.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b340666b-22be-43e5-9560-497364112a58 response_code = 405 uri = /v1/system/users?silo=default-silo
194452025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client received response status = 405
194462025-03-07T23:12:37.062ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/users?silo=default-silo
194472025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194482025-03-07T23:12:37.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 37041c1f-b593-435c-b774-921508b5eb96 uri = /v1/system/users?silo=default-silo
194492025-03-07T23:12:37.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 37041c1f-b593-435c-b774-921508b5eb96 response_code = 405 uri = /v1/system/users?silo=default-silo
194502025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client received response status = 405
194512025-03-07T23:12:37.062ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/users?silo=default-silo
194522025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194532025-03-07T23:12:37.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c45e595e-2d9b-42f5-80df-a1731ceafa55 uri = /v1/system/users?silo=default-silo
194542025-03-07T23:12:37.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c45e595e-2d9b-42f5-80df-a1731ceafa55 response_code = 405 uri = /v1/system/users?silo=default-silo
194552025-03-07T23:12:37.062ZINFOtest_unauthorized (external client test context): client received response status = 405
194562025-03-07T23:12:37.062ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/users?silo=default-silo
194572025-03-07T23:12:37.063ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194582025-03-07T23:12:37.063ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 319554c4-30e1-428c-bdb1-cf3cf488a5eb uri = /v1/system/users?silo=default-silo
194592025-03-07T23:12:37.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 319554c4-30e1-428c-bdb1-cf3cf488a5eb response_code = 405 uri = /v1/system/users?silo=default-silo
194602025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client received response status = 405
194612025-03-07T23:12:37.064ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/users?silo=default-silo
194622025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194632025-03-07T23:12:37.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33c0999b-e58e-43b0-9d2d-4608c29215aa uri = /v1/system/users?silo=default-silo
194642025-03-07T23:12:37.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 33c0999b-e58e-43b0-9d2d-4608c29215aa response_code = 405 uri = /v1/system/users?silo=default-silo
194652025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client received response status = 405
194662025-03-07T23:12:37.064ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/users?silo=default-silo
194672025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194682025-03-07T23:12:37.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 05dfa776-a410-4e71-a21c-d79952d6c5d6 uri = /v1/system/users?silo=default-silo
194692025-03-07T23:12:37.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 05dfa776-a410-4e71-a21c-d79952d6c5d6 response_code = 405 uri = /v1/system/users?silo=default-silo
194702025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client received response status = 405
194712025-03-07T23:12:37.064ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/users?silo=default-silo
194722025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194732025-03-07T23:12:37.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38390dc3-c94e-42fe-a32a-20921d44d4ba uri = /v1/system/users?silo=default-silo
194742025-03-07T23:12:37.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38390dc3-c94e-42fe-a32a-20921d44d4ba response_code = 405 uri = /v1/system/users?silo=default-silo
194752025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client received response status = 405
194762025-03-07T23:12:37.064ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/users?silo=default-silo
194772025-03-07T23:12:37.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194782025-03-07T23:12:37.065ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = de79ad57-655d-488f-ba48-0f647025cf40 uri = /v1/system/users?silo=default-silo
194792025-03-07T23:12:37.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = de79ad57-655d-488f-ba48-0f647025cf40 response_code = 405 uri = /v1/system/users?silo=default-silo
194802025-03-07T23:12:37.066ZINFOtest_unauthorized (external client test context): client received response status = 405
194812025-03-07T23:12:37.066ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/users?silo=default-silo
194822025-03-07T23:12:37.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194832025-03-07T23:12:37.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = caca1f9c-bf66-4981-bf3f-c5bd91983365 uri = /v1/system/users?silo=default-silo
194842025-03-07T23:12:37.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = caca1f9c-bf66-4981-bf3f-c5bd91983365 response_code = 405 uri = /v1/system/users?silo=default-silo
194852025-03-07T23:12:37.066ZINFOtest_unauthorized (external client test context): client received response status = 405
194862025-03-07T23:12:37.066ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/users?silo=default-silo
194872025-03-07T23:12:37.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194882025-03-07T23:12:37.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e87c607-50e0-426e-8c97-09a337d5af24 uri = /v1/system/users?silo=default-silo
194892025-03-07T23:12:37.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e87c607-50e0-426e-8c97-09a337d5af24 response_code = 405 uri = /v1/system/users?silo=default-silo
194902025-03-07T23:12:37.067ZINFOtest_unauthorized (external client test context): client received response status = 405
194912025-03-07T23:12:37.067ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/users?silo=default-silo
194922025-03-07T23:12:37.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194932025-03-07T23:12:37.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a0413415-9039-482d-bd40-80e21776fcbb uri = /v1/system/users?silo=default-silo
194942025-03-07T23:12:37.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a0413415-9039-482d-bd40-80e21776fcbb response_code = 405 uri = /v1/system/users?silo=default-silo
194952025-03-07T23:12:37.075ZINFOtest_unauthorized (external client test context): client received response status = 405
194962025-03-07T23:12:37.075ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/users?silo=default-silo
194972025-03-07T23:12:37.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
194982025-03-07T23:12:37.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e8a1393a-5d17-41cd-88e7-9efd31dddcf7 uri = /v1/system/users?silo=default-silo
194992025-03-07T23:12:37.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e8a1393a-5d17-41cd-88e7-9efd31dddcf7 response_code = 405 uri = /v1/system/users?silo=default-silo
195002025-03-07T23:12:37.075ZINFOtest_unauthorized (external client test context): client received response status = 405
195012025-03-07T23:12:37.075ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/users?silo=default-silo
195022025-03-07T23:12:37.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users?silo=default-silo
195032025-03-07T23:12:37.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 uri = /v1/system/users?silo=default-silo
195042025-03-07T23:12:37.083ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 uri = /v1/system/users?silo=default-silo
195052025-03-07T23:12:37.084ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users?silo=default-silo
195062025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195072025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195082025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195092025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195102025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195112025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195122025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
195132025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
195142025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195152025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195162025-03-07T23:12:37.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195172025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
195182025-03-07T23:12:37.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195192025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195202025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195212025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
195222025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
195232025-03-07T23:12:37.086ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195242025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195252025-03-07T23:12:37.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195262025-03-07T23:12:37.086ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
195272025-03-07T23:12:37.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
195282025-03-07T23:12:37.088ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195292025-03-07T23:12:37.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195302025-03-07T23:12:37.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195312025-03-07T23:12:37.091ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
195322025-03-07T23:12:37.092ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195332025-03-07T23:12:37.092ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195342025-03-07T23:12:37.092ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195352025-03-07T23:12:37.094ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
195362025-03-07T23:12:37.098ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
195372025-03-07T23:12:37.099ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 uri = /v1/system/users?silo=default-silo
195382025-03-07T23:12:37.099ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195392025-03-07T23:12:37.099ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195402025-03-07T23:12:37.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195412025-03-07T23:12:37.102ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users?silo=default-silo
195422025-03-07T23:12:37.102ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
195432025-03-07T23:12:37.102ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195442025-03-07T23:12:37.102ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195452025-03-07T23:12:37.103ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195462025-03-07T23:12:37.107ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
195472025-03-07T23:12:37.107ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195482025-03-07T23:12:37.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195492025-03-07T23:12:37.108ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195502025-03-07T23:12:37.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
195512025-03-07T23:12:37.117ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users?silo=default-silo
195522025-03-07T23:12:37.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/users?silo=default-silo
195532025-03-07T23:12:37.117ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
195542025-03-07T23:12:37.119ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195552025-03-07T23:12:37.119ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195562025-03-07T23:12:37.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195572025-03-07T23:12:37.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
195582025-03-07T23:12:37.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195592025-03-07T23:12:37.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195602025-03-07T23:12:37.125ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195612025-03-07T23:12:37.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
195622025-03-07T23:12:37.141ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/users?silo=default-silo
195632025-03-07T23:12:37.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database uri = /v1/system/users?silo=default-silo
195642025-03-07T23:12:37.142ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195652025-03-07T23:12:37.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195662025-03-07T23:12:37.145ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 77768 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a7f48b07-debe-4f69-907b-1bf0113f54b9 response_code = 200 uri = /v1/system/users?silo=default-silo
195672025-03-07T23:12:37.145ZINFOtest_unauthorized (external client test context): client received response status = 200
195682025-03-07T23:12:37.146ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users?silo=default-silo
195692025-03-07T23:12:37.146ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users?silo=default-silo
195702025-03-07T23:12:37.146ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
195712025-03-07T23:12:37.146ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
195722025-03-07T23:12:37.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195732025-03-07T23:12:37.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 67a6f503-eb8b-4d3e-a28b-35990dba4e9a uri = /v1/system/identity-providers/local/users?silo=default-silo
195742025-03-07T23:12:37.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 96 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 67a6f503-eb8b-4d3e-a28b-35990dba4e9a response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
195752025-03-07T23:12:37.147ZINFOtest_unauthorized (external client test context): client received response status = 405
195762025-03-07T23:12:37.147ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
195772025-03-07T23:12:37.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195782025-03-07T23:12:37.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0793d6cf-9825-460f-a9ac-efca73eac84a uri = /v1/system/identity-providers/local/users?silo=default-silo
195792025-03-07T23:12:37.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0793d6cf-9825-460f-a9ac-efca73eac84a response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
195802025-03-07T23:12:37.148ZINFOtest_unauthorized (external client test context): client received response status = 405
195812025-03-07T23:12:37.148ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
195822025-03-07T23:12:37.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195832025-03-07T23:12:37.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 52c8e649-d5d5-43a0-9854-8a0dd3187d9f uri = /v1/system/identity-providers/local/users?silo=default-silo
195842025-03-07T23:12:37.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 52c8e649-d5d5-43a0-9854-8a0dd3187d9f response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
195852025-03-07T23:12:37.149ZINFOtest_unauthorized (external client test context): client received response status = 405
195862025-03-07T23:12:37.149ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
195872025-03-07T23:12:37.149ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195882025-03-07T23:12:37.149ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 340906d2-cce1-4e20-8207-dadb87ab2a82 uri = /v1/system/identity-providers/local/users?silo=default-silo
195892025-03-07T23:12:37.149ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 340906d2-cce1-4e20-8207-dadb87ab2a82 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
195902025-03-07T23:12:37.149ZINFOtest_unauthorized (external client test context): client received response status = 405
195912025-03-07T23:12:37.149ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
195922025-03-07T23:12:37.150ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195932025-03-07T23:12:37.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6c65882b-d2b3-4b5e-8d4e-2775bb788269 uri = /v1/system/identity-providers/local/users?silo=default-silo
195942025-03-07T23:12:37.150ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6c65882b-d2b3-4b5e-8d4e-2775bb788269 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
195952025-03-07T23:12:37.150ZINFOtest_unauthorized (external client test context): client received response status = 405
195962025-03-07T23:12:37.150ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
195972025-03-07T23:12:37.150ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
195982025-03-07T23:12:37.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4f540e90-dc24-488f-a246-38dd8673b534 uri = /v1/system/identity-providers/local/users?silo=default-silo
195992025-03-07T23:12:37.150ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4f540e90-dc24-488f-a246-38dd8673b534 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
196002025-03-07T23:12:37.150ZINFOtest_unauthorized (external client test context): client received response status = 405
196012025-03-07T23:12:37.150ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
196022025-03-07T23:12:37.150ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
196032025-03-07T23:12:37.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d5a99c44-ab41-4b40-ab49-1697dca03df2 uri = /v1/system/identity-providers/local/users?silo=default-silo
196042025-03-07T23:12:37.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d5a99c44-ab41-4b40-ab49-1697dca03df2 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
196052025-03-07T23:12:37.151ZINFOtest_unauthorized (external client test context): client received response status = 405
196062025-03-07T23:12:37.151ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
196072025-03-07T23:12:37.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
196082025-03-07T23:12:37.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be uri = /v1/system/identity-providers/local/users?silo=default-silo
196092025-03-07T23:12:37.154ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be uri = /v1/system/identity-providers/local/users?silo=default-silo
196102025-03-07T23:12:37.154ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users?silo=default-silo
196112025-03-07T23:12:37.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196122025-03-07T23:12:37.154ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196132025-03-07T23:12:37.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196142025-03-07T23:12:37.155ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196152025-03-07T23:12:37.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196162025-03-07T23:12:37.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196172025-03-07T23:12:37.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
196182025-03-07T23:12:37.160ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
196192025-03-07T23:12:37.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196202025-03-07T23:12:37.161ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196212025-03-07T23:12:37.161ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196222025-03-07T23:12:37.162ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
196232025-03-07T23:12:37.163ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196242025-03-07T23:12:37.163ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196252025-03-07T23:12:37.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196262025-03-07T23:12:37.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
196272025-03-07T23:12:37.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
196282025-03-07T23:12:37.169ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196292025-03-07T23:12:37.169ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196302025-03-07T23:12:37.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196312025-03-07T23:12:37.172ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
196322025-03-07T23:12:37.172ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
196332025-03-07T23:12:37.172ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196342025-03-07T23:12:37.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196352025-03-07T23:12:37.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196362025-03-07T23:12:37.175ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
196372025-03-07T23:12:37.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196382025-03-07T23:12:37.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196392025-03-07T23:12:37.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196402025-03-07T23:12:37.177ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
196412025-03-07T23:12:37.181ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
196422025-03-07T23:12:37.181ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be uri = /v1/system/identity-providers/local/users?silo=default-silo
196432025-03-07T23:12:37.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196442025-03-07T23:12:37.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196452025-03-07T23:12:37.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196462025-03-07T23:12:37.184ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users?silo=default-silo
196472025-03-07T23:12:37.185ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
196482025-03-07T23:12:37.185ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196492025-03-07T23:12:37.185ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196502025-03-07T23:12:37.186ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196512025-03-07T23:12:37.187ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
196522025-03-07T23:12:37.188ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196532025-03-07T23:12:37.188ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196542025-03-07T23:12:37.188ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196552025-03-07T23:12:37.191ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196562025-03-07T23:12:37.194ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196572025-03-07T23:12:37.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/identity-providers/local/users?silo=default-silo
196582025-03-07T23:12:37.195ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
196592025-03-07T23:12:37.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196602025-03-07T23:12:37.195ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196612025-03-07T23:12:37.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196622025-03-07T23:12:37.203ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
196632025-03-07T23:12:37.203ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196642025-03-07T23:12:37.203ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196652025-03-07T23:12:37.204ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
196662025-03-07T23:12:37.207ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196672025-03-07T23:12:37.213ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Err(Forbidden) uri = /v1/system/identity-providers/local/users?silo=default-silo
196682025-03-07T23:12:37.213ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 61965 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2cd3e3d4-d36e-44a6-a072-384a788b69be response_code = 403 uri = /v1/system/identity-providers/local/users?silo=default-silo
196692025-03-07T23:12:37.214ZINFOtest_unauthorized (external client test context): client received response status = 403
196702025-03-07T23:12:37.215ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
196712025-03-07T23:12:37.215ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
196722025-03-07T23:12:37.217ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 uri = /v1/system/identity-providers/local/users?silo=default-silo
196732025-03-07T23:12:37.217ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 uri = /v1/system/identity-providers/local/users?silo=default-silo
196742025-03-07T23:12:37.217ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 uri = /v1/system/identity-providers/local/users?silo=default-silo
196752025-03-07T23:12:37.217ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 uri = /v1/system/identity-providers/local/users?silo=default-silo
196762025-03-07T23:12:37.218ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
196772025-03-07T23:12:37.218ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
196782025-03-07T23:12:37.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users?silo=default-silo
196792025-03-07T23:12:37.218ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1112 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef56c0c1-8ad3-4eb2-aad2-8e10d0674094 response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
196802025-03-07T23:12:37.218ZINFOtest_unauthorized (external client test context): client received response status = 401
196812025-03-07T23:12:37.219ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
196822025-03-07T23:12:37.219ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
196832025-03-07T23:12:37.219ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acd1ea5-3090-4ced-8c8c-5feaf01b17c6 uri = /v1/system/identity-providers/local/users?silo=default-silo
196842025-03-07T23:12:37.219ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acd1ea5-3090-4ced-8c8c-5feaf01b17c6 uri = /v1/system/identity-providers/local/users?silo=default-silo
196852025-03-07T23:12:37.220ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acd1ea5-3090-4ced-8c8c-5feaf01b17c6 uri = /v1/system/identity-providers/local/users?silo=default-silo
196862025-03-07T23:12:37.220ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 328 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acd1ea5-3090-4ced-8c8c-5feaf01b17c6 response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
196872025-03-07T23:12:37.220ZINFOtest_unauthorized (external client test context): client received response status = 401
196882025-03-07T23:12:37.220ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
196892025-03-07T23:12:37.220ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
196902025-03-07T23:12:37.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da8c3f36-bf60-4342-99a2-c2e859325800 uri = /v1/system/identity-providers/local/users?silo=default-silo
196912025-03-07T23:12:37.220ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da8c3f36-bf60-4342-99a2-c2e859325800 uri = /v1/system/identity-providers/local/users?silo=default-silo
196922025-03-07T23:12:37.221ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:749:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:766:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da8c3f36-bf60-4342-99a2-c2e859325800 uri = /v1/system/identity-providers/local/users?silo=default-silo
196932025-03-07T23:12:37.221ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1127 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = da8c3f36-bf60-4342-99a2-c2e859325800 response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
196942025-03-07T23:12:37.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
196952025-03-07T23:12:37.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
196962025-03-07T23:12:37.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
196972025-03-07T23:12:37.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
196982025-03-07T23:12:37.221ZINFOtest_unauthorized (external client test context): client received response status = 401
196992025-03-07T23:12:37.221ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
197002025-03-07T23:12:37.221ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197012025-03-07T23:12:37.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bf44005b-f986-4176-8538-67abe86f0088 uri = /v1/system/identity-providers/local/users?silo=default-silo
197022025-03-07T23:12:37.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bf44005b-f986-4176-8538-67abe86f0088 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197032025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client received response status = 405
197042025-03-07T23:12:37.223ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
197052025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197062025-03-07T23:12:37.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cc7278af-8b81-4289-a667-25ee2c6416ca uri = /v1/system/identity-providers/local/users?silo=default-silo
197072025-03-07T23:12:37.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cc7278af-8b81-4289-a667-25ee2c6416ca response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197082025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client received response status = 405
197092025-03-07T23:12:37.223ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
197102025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197112025-03-07T23:12:37.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 071fe8fb-df43-4557-9d96-9abf6f040753 uri = /v1/system/identity-providers/local/users?silo=default-silo
197122025-03-07T23:12:37.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 071fe8fb-df43-4557-9d96-9abf6f040753 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197132025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client received response status = 405
197142025-03-07T23:12:37.223ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
197152025-03-07T23:12:37.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197162025-03-07T23:12:37.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a78aae6c-3bb5-4ea2-898e-134f03984ad0 uri = /v1/system/identity-providers/local/users?silo=default-silo
197172025-03-07T23:12:37.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a78aae6c-3bb5-4ea2-898e-134f03984ad0 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197182025-03-07T23:12:37.224ZINFOtest_unauthorized (external client test context): client received response status = 405
197192025-03-07T23:12:37.224ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
197202025-03-07T23:12:37.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197212025-03-07T23:12:37.226ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
197222025-03-07T23:12:37.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
197232025-03-07T23:12:37.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e0b9e0a1-4a07-472e-a521-868999dae3ca uri = /v1/system/identity-providers/local/users?silo=default-silo
197242025-03-07T23:12:37.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e0b9e0a1-4a07-472e-a521-868999dae3ca response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197252025-03-07T23:12:37.226ZINFOtest_unauthorized (external client test context): client received response status = 405
197262025-03-07T23:12:37.226ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
197272025-03-07T23:12:37.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197282025-03-07T23:12:37.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8d2e790c-1e6b-4482-b6d2-3185808d7731 uri = /v1/system/identity-providers/local/users?silo=default-silo
197292025-03-07T23:12:37.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8d2e790c-1e6b-4482-b6d2-3185808d7731 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197302025-03-07T23:12:37.226ZINFOtest_unauthorized (external client test context): client received response status = 405
197312025-03-07T23:12:37.226ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
197322025-03-07T23:12:37.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197332025-03-07T23:12:37.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bddef9c5-5e21-42ba-bab3-ce68d3f45e81 uri = /v1/system/identity-providers/local/users?silo=default-silo
197342025-03-07T23:12:37.227ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bddef9c5-5e21-42ba-bab3-ce68d3f45e81 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197352025-03-07T23:12:37.227ZINFOtest_unauthorized (external client test context): client received response status = 405
197362025-03-07T23:12:37.228ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
197372025-03-07T23:12:37.228ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users?silo=default-silo
197382025-03-07T23:12:37.228ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3af4728f-215d-498a-924c-f89bbbff3170 uri = /v1/system/identity-providers/local/users?silo=default-silo
197392025-03-07T23:12:37.228ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3af4728f-215d-498a-924c-f89bbbff3170 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197402025-03-07T23:12:37.228ZINFOtest_unauthorized (external client test context): client received response status = 405
197412025-03-07T23:12:37.228ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users?silo=default-silo
197422025-03-07T23:12:37.228ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/users/{id}?silo=default-silo
197432025-03-07T23:12:37.229ZINFOtest_unauthorized: test: privileged GET url = /v1/system/users/{id}?silo=default-silo
197442025-03-07T23:12:37.229ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197452025-03-07T23:12:37.229ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197462025-03-07T23:12:37.229ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197472025-03-07T23:12:37.229ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197482025-03-07T23:12:37.229ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197492025-03-07T23:12:37.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197502025-03-07T23:12:37.230ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197512025-03-07T23:12:37.230ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
197522025-03-07T23:12:37.231ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
197532025-03-07T23:12:37.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197542025-03-07T23:12:37.231ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197552025-03-07T23:12:37.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197562025-03-07T23:12:37.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
197572025-03-07T23:12:37.233ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
197582025-03-07T23:12:37.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197592025-03-07T23:12:37.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197602025-03-07T23:12:37.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197612025-03-07T23:12:37.235ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
197622025-03-07T23:12:37.235ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197632025-03-07T23:12:37.235ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197642025-03-07T23:12:37.236ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197652025-03-07T23:12:37.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
197662025-03-07T23:12:37.240ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
197672025-03-07T23:12:37.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197682025-03-07T23:12:37.241ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197692025-03-07T23:12:37.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197702025-03-07T23:12:37.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
197712025-03-07T23:12:37.244ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
197722025-03-07T23:12:37.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197732025-03-07T23:12:37.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197742025-03-07T23:12:37.245ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197752025-03-07T23:12:37.254ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
197762025-03-07T23:12:37.254ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197772025-03-07T23:12:37.254ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197782025-03-07T23:12:37.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197792025-03-07T23:12:37.261ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
197802025-03-07T23:12:37.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
197812025-03-07T23:12:37.276ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197822025-03-07T23:12:37.276ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197832025-03-07T23:12:37.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197842025-03-07T23:12:37.276ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197852025-03-07T23:12:37.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197862025-03-07T23:12:37.283ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197872025-03-07T23:12:37.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197882025-03-07T23:12:37.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197892025-03-07T23:12:37.309ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197902025-03-07T23:12:37.315ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197912025-03-07T23:12:37.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197922025-03-07T23:12:37.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197932025-03-07T23:12:37.317ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197942025-03-07T23:12:37.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
197952025-03-07T23:12:37.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197962025-03-07T23:12:37.333ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197972025-03-07T23:12:37.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197982025-03-07T23:12:37.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
197992025-03-07T23:12:37.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198002025-03-07T23:12:37.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198012025-03-07T23:12:37.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198022025-03-07T23:12:37.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198032025-03-07T23:12:37.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198042025-03-07T23:12:37.351ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198052025-03-07T23:12:37.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198062025-03-07T23:12:37.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198072025-03-07T23:12:37.352ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198082025-03-07T23:12:37.360ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198092025-03-07T23:12:37.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198102025-03-07T23:12:37.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198112025-03-07T23:12:37.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198122025-03-07T23:12:37.367ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198132025-03-07T23:12:37.370ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198142025-03-07T23:12:37.371ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 144661 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0dbeb0f6-8d1a-4e9c-ac00-8e422a453cd8 response_code = 200 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198152025-03-07T23:12:37.372ZINFOtest_unauthorized (external client test context): client received response status = 200
198162025-03-07T23:12:37.373ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/users/{id}?silo=default-silo
198172025-03-07T23:12:37.373ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/users/{id}?silo=default-silo
198182025-03-07T23:12:37.373ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198192025-03-07T23:12:37.373ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198202025-03-07T23:12:37.373ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198212025-03-07T23:12:37.373ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198222025-03-07T23:12:37.374ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198232025-03-07T23:12:37.375ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198242025-03-07T23:12:37.375ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198252025-03-07T23:12:37.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198262025-03-07T23:12:37.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1676 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d2c7ee5-e11f-4c5a-ae06-597e285ecf88 response_code = 401 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198272025-03-07T23:12:37.375ZINFOtest_unauthorized (external client test context): client received response status = 401
198282025-03-07T23:12:37.375ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/users/{id}?silo=default-silo
198292025-03-07T23:12:37.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198302025-03-07T23:12:37.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e5e823f-8ac7-4b55-a13e-31077fb4428f uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198312025-03-07T23:12:37.375ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e5e823f-8ac7-4b55-a13e-31077fb4428f uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198322025-03-07T23:12:37.376ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e5e823f-8ac7-4b55-a13e-31077fb4428f uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198332025-03-07T23:12:37.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 322 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e5e823f-8ac7-4b55-a13e-31077fb4428f response_code = 401 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198342025-03-07T23:12:37.377ZINFOtest_unauthorized (external client test context): client received response status = 401
198352025-03-07T23:12:37.377ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/users/{id}?silo=default-silo
198362025-03-07T23:12:37.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198372025-03-07T23:12:37.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b186371f-098b-4851-9020-bdd1a79a7aa5 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198382025-03-07T23:12:37.377ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b186371f-098b-4851-9020-bdd1a79a7aa5 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198392025-03-07T23:12:37.377ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:620:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:634:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b186371f-098b-4851-9020-bdd1a79a7aa5 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198402025-03-07T23:12:37.380ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1108 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b186371f-098b-4851-9020-bdd1a79a7aa5 response_code = 401 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198412025-03-07T23:12:37.382ZINFOtest_unauthorized (external client test context): client received response status = 401
198422025-03-07T23:12:37.382ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/users/{id}?silo=default-silo
198432025-03-07T23:12:37.382ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198442025-03-07T23:12:37.382ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7cc7f69d-67ef-4e70-b94c-22b568a33fc3 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198452025-03-07T23:12:37.382ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7cc7f69d-67ef-4e70-b94c-22b568a33fc3 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198462025-03-07T23:12:37.382ZINFOtest_unauthorized (external client test context): client received response status = 405
198472025-03-07T23:12:37.382ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/users/{id}?silo=default-silo
198482025-03-07T23:12:37.382ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198492025-03-07T23:12:37.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6e755f11-ce57-4494-bfb0-76e8fb24508a uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198502025-03-07T23:12:37.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6e755f11-ce57-4494-bfb0-76e8fb24508a response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198512025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client received response status = 405
198522025-03-07T23:12:37.384ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/users/{id}?silo=default-silo
198532025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198542025-03-07T23:12:37.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 58fa3f82-3173-411a-9c7f-69140da0181b uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198552025-03-07T23:12:37.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 58fa3f82-3173-411a-9c7f-69140da0181b response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198562025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client received response status = 405
198572025-03-07T23:12:37.384ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/users/{id}?silo=default-silo
198582025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198592025-03-07T23:12:37.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fb2512f6-816f-40bd-9b97-c1db164a695d uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198602025-03-07T23:12:37.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fb2512f6-816f-40bd-9b97-c1db164a695d response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198612025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client received response status = 405
198622025-03-07T23:12:37.384ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/users/{id}?silo=default-silo
198632025-03-07T23:12:37.384ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198642025-03-07T23:12:37.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 600bb679-9277-4ebb-986f-733dac803fef uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198652025-03-07T23:12:37.385ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 600bb679-9277-4ebb-986f-733dac803fef response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198662025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client received response status = 405
198672025-03-07T23:12:37.386ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/users/{id}?silo=default-silo
198682025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198692025-03-07T23:12:37.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 764037d0-f537-4231-9735-84130cb31f61 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198702025-03-07T23:12:37.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 764037d0-f537-4231-9735-84130cb31f61 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198712025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client received response status = 405
198722025-03-07T23:12:37.386ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/users/{id}?silo=default-silo
198732025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198742025-03-07T23:12:37.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d8947120-703c-4ace-b60f-491b68c99d9f uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198752025-03-07T23:12:37.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d8947120-703c-4ace-b60f-491b68c99d9f response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198762025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client received response status = 405
198772025-03-07T23:12:37.386ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/users/{id}?silo=default-silo
198782025-03-07T23:12:37.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198792025-03-07T23:12:37.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cfa33951-a711-4193-a7bb-40cf3b02c77e uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198802025-03-07T23:12:37.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cfa33951-a711-4193-a7bb-40cf3b02c77e response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198812025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client received response status = 405
198822025-03-07T23:12:37.388ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/users/{id}?silo=default-silo
198832025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198842025-03-07T23:12:37.388ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9e37dc4e-1437-434b-8ad7-caa2a00be624 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198852025-03-07T23:12:37.388ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9e37dc4e-1437-434b-8ad7-caa2a00be624 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198862025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client received response status = 405
198872025-03-07T23:12:37.388ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/users/{id}?silo=default-silo
198882025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198892025-03-07T23:12:37.388ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 88e6741d-d4fe-4c6b-a8e8-61233be3cdb0 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198902025-03-07T23:12:37.388ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 88e6741d-d4fe-4c6b-a8e8-61233be3cdb0 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198912025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client received response status = 405
198922025-03-07T23:12:37.388ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/users/{id}?silo=default-silo
198932025-03-07T23:12:37.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198942025-03-07T23:12:37.388ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fb82e258-14f5-4fd4-8934-dc1b36a84936 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198952025-03-07T23:12:37.388ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fb82e258-14f5-4fd4-8934-dc1b36a84936 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198962025-03-07T23:12:37.389ZINFOtest_unauthorized (external client test context): client received response status = 405
198972025-03-07T23:12:37.389ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/users/{id}?silo=default-silo
198982025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
198992025-03-07T23:12:37.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e3fb5a9d-f47c-40b2-a2f8-3756783ffecd uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199002025-03-07T23:12:37.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e3fb5a9d-f47c-40b2-a2f8-3756783ffecd response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199012025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client received response status = 405
199022025-03-07T23:12:37.390ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/users/{id}?silo=default-silo
199032025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199042025-03-07T23:12:37.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 518340b8-a8a7-43ee-9bfa-f4e288d0f6f8 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199052025-03-07T23:12:37.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 518340b8-a8a7-43ee-9bfa-f4e288d0f6f8 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199062025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client received response status = 405
199072025-03-07T23:12:37.390ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/users/{id}?silo=default-silo
199082025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199092025-03-07T23:12:37.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 60109228-1ecd-45af-a0ac-f971013b71fc uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199102025-03-07T23:12:37.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 60109228-1ecd-45af-a0ac-f971013b71fc response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199112025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client received response status = 405
199122025-03-07T23:12:37.390ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/users/{id}?silo=default-silo
199132025-03-07T23:12:37.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199142025-03-07T23:12:37.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 75c7217c-a4be-465e-8355-821d2f23bed4 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199152025-03-07T23:12:37.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 75c7217c-a4be-465e-8355-821d2f23bed4 response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199162025-03-07T23:12:37.397ZINFOtest_unauthorized (external client test context): client received response status = 405
199172025-03-07T23:12:37.397ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/users/{id}?silo=default-silo
199182025-03-07T23:12:37.397ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199192025-03-07T23:12:37.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 00eecc2b-4cd3-4ce9-b869-ccb7a63cbcde uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199202025-03-07T23:12:37.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 00eecc2b-4cd3-4ce9-b869-ccb7a63cbcde response_code = 405 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199212025-03-07T23:12:37.397ZINFOtest_unauthorized (external client test context): client received response status = 405
199222025-03-07T23:12:37.397ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/users/{id}?silo=default-silo
199232025-03-07T23:12:37.397ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199242025-03-07T23:12:37.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199252025-03-07T23:12:37.397ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199262025-03-07T23:12:37.397ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199272025-03-07T23:12:37.398ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199282025-03-07T23:12:37.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199292025-03-07T23:12:37.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199302025-03-07T23:12:37.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199312025-03-07T23:12:37.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199322025-03-07T23:12:37.412ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199332025-03-07T23:12:37.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
199342025-03-07T23:12:37.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
199352025-03-07T23:12:37.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199362025-03-07T23:12:37.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199372025-03-07T23:12:37.413ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199382025-03-07T23:12:37.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
199392025-03-07T23:12:37.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199402025-03-07T23:12:37.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199412025-03-07T23:12:37.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199422025-03-07T23:12:37.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
199432025-03-07T23:12:37.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
199442025-03-07T23:12:37.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199452025-03-07T23:12:37.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199462025-03-07T23:12:37.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199472025-03-07T23:12:37.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
199482025-03-07T23:12:37.431ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
199492025-03-07T23:12:37.431ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199502025-03-07T23:12:37.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199512025-03-07T23:12:37.432ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199522025-03-07T23:12:37.434ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
199532025-03-07T23:12:37.435ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199542025-03-07T23:12:37.435ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199552025-03-07T23:12:37.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199562025-03-07T23:12:37.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
199572025-03-07T23:12:37.450ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
199582025-03-07T23:12:37.450ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199592025-03-07T23:12:37.450ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199602025-03-07T23:12:37.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199612025-03-07T23:12:37.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199622025-03-07T23:12:37.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199632025-03-07T23:12:37.456ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199642025-03-07T23:12:37.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199652025-03-07T23:12:37.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199662025-03-07T23:12:37.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199672025-03-07T23:12:37.463ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199682025-03-07T23:12:37.464ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199692025-03-07T23:12:37.464ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199702025-03-07T23:12:37.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199712025-03-07T23:12:37.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199722025-03-07T23:12:37.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199732025-03-07T23:12:37.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199742025-03-07T23:12:37.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199752025-03-07T23:12:37.500ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199762025-03-07T23:12:37.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199772025-03-07T23:12:37.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199782025-03-07T23:12:37.503ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199792025-03-07T23:12:37.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199802025-03-07T23:12:37.511ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199812025-03-07T23:12:37.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199822025-03-07T23:12:37.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199832025-03-07T23:12:37.513ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199842025-03-07T23:12:37.520ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199852025-03-07T23:12:37.520ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199862025-03-07T23:12:37.520ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199872025-03-07T23:12:37.521ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = Database result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199882025-03-07T23:12:37.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199892025-03-07T23:12:37.536ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } result = Ok(()) uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199902025-03-07T23:12:37.538ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 146949 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7b3ea7db-3fed-4f90-abfb-1daca77e390b response_code = 200 uri = /v1/system/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199912025-03-07T23:12:37.540ZINFOtest_unauthorized (external client test context): client received response status = 200
199922025-03-07T23:12:37.542ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
199932025-03-07T23:12:37.542ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
199942025-03-07T23:12:37.542ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
199952025-03-07T23:12:37.542ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
199962025-03-07T23:12:37.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199972025-03-07T23:12:37.546ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80afb897-5a5f-4979-80a0-445d4595a4dd uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199982025-03-07T23:12:37.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1378 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80afb897-5a5f-4979-80a0-445d4595a4dd response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
199992025-03-07T23:12:37.550ZINFOtest_unauthorized (external client test context): client received response status = 405
200002025-03-07T23:12:37.551ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200012025-03-07T23:12:37.556ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200022025-03-07T23:12:37.556ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fee53abd-44ad-4cff-9bc7-0606a3133e88 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200032025-03-07T23:12:37.556ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 261 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fee53abd-44ad-4cff-9bc7-0606a3133e88 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200042025-03-07T23:12:37.557ZINFOtest_unauthorized (external client test context): client received response status = 405
200052025-03-07T23:12:37.558ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200062025-03-07T23:12:37.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200072025-03-07T23:12:37.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6475338-13c2-4824-8101-09415228a14c uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200082025-03-07T23:12:37.558ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6475338-13c2-4824-8101-09415228a14c response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200092025-03-07T23:12:37.582ZINFOtest_unauthorized (external client test context): client received response status = 405
200102025-03-07T23:12:37.582ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200112025-03-07T23:12:37.582ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200122025-03-07T23:12:37.583ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
200132025-03-07T23:12:37.583ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200142025-03-07T23:12:37.584ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 88a90340-51b9-4720-afc2-68aa283d7ff0 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200152025-03-07T23:12:37.585ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 88a90340-51b9-4720-afc2-68aa283d7ff0 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200162025-03-07T23:12:37.585ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d7e38392-91ef-4d3b-84eb-8241dc5a569a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200172025-03-07T23:12:37.585ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d7e38392-91ef-4d3b-84eb-8241dc5a569a resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200182025-03-07T23:12:37.585ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d7e38392-91ef-4d3b-84eb-8241dc5a569a roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200192025-03-07T23:12:37.586ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d7e38392-91ef-4d3b-84eb-8241dc5a569a resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200202025-03-07T23:12:37.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200212025-03-07T23:12:37.590ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5867 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d7e38392-91ef-4d3b-84eb-8241dc5a569a response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
200222025-03-07T23:12:37.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200232025-03-07T23:12:37.591ZINFOtest_unauthorized (external client test context): client received response status = 405
200242025-03-07T23:12:37.592ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200252025-03-07T23:12:37.592ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200262025-03-07T23:12:37.592ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "d7e38392-91ef-4d3b-84eb-8241dc5a569a", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:36 GMT"} })
200272025-03-07T23:12:37.592ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200282025-03-07T23:12:37.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b39f8645-bb58-4a53-bdc0-cd6a8f57a10d uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200292025-03-07T23:12:37.594ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b39f8645-bb58-4a53-bdc0-cd6a8f57a10d response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200302025-03-07T23:12:37.594ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29616265-9289-4c0b-af37-60690031513c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200312025-03-07T23:12:37.595ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29616265-9289-4c0b-af37-60690031513c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200322025-03-07T23:12:37.595ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29616265-9289-4c0b-af37-60690031513c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200332025-03-07T23:12:37.596ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29616265-9289-4c0b-af37-60690031513c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200342025-03-07T23:12:37.596ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200352025-03-07T23:12:37.597ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200362025-03-07T23:12:37.597ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200372025-03-07T23:12:37.597ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200382025-03-07T23:12:37.598ZINFOtest_unauthorized (external client test context): client received response status = 405
200392025-03-07T23:12:37.598ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200402025-03-07T23:12:37.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200412025-03-07T23:12:37.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aef3f7fd-b84b-4082-9e76-b694f73decc8 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200422025-03-07T23:12:37.598ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aef3f7fd-b84b-4082-9e76-b694f73decc8 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200432025-03-07T23:12:37.598ZINFOtest_unauthorized (external client test context): client received response status = 405
200442025-03-07T23:12:37.599ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200452025-03-07T23:12:37.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200462025-03-07T23:12:37.599ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4904 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29616265-9289-4c0b-af37-60690031513c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
200472025-03-07T23:12:37.600ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b3c1737-7106-46b3-a5f7-b94353ca05d3 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200482025-03-07T23:12:37.600ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b3c1737-7106-46b3-a5f7-b94353ca05d3 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200492025-03-07T23:12:37.600ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "29616265-9289-4c0b-af37-60690031513c", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:36 GMT"} })
200502025-03-07T23:12:37.600ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
200512025-03-07T23:12:37.600ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
200522025-03-07T23:12:37.600ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
200532025-03-07T23:12:37.600ZINFOtest_unauthorized (external client test context): client received response status = 405
200542025-03-07T23:12:37.600ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200552025-03-07T23:12:37.600ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200562025-03-07T23:12:37.601ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e71a2dfa-1127-4cf2-8cb7-b002e0d4a754 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200572025-03-07T23:12:37.602ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e71a2dfa-1127-4cf2-8cb7-b002e0d4a754 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200582025-03-07T23:12:37.602ZINFOtest_unauthorized (external client test context): client received response status = 405
200592025-03-07T23:12:37.602ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200602025-03-07T23:12:37.602ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200612025-03-07T23:12:37.602ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9c374269-b77c-4c96-a995-b2309fd61e05 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200622025-03-07T23:12:37.602ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9c374269-b77c-4c96-a995-b2309fd61e05 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200632025-03-07T23:12:37.602ZINFOtest_unauthorized (external client test context): client received response status = 405
200642025-03-07T23:12:37.602ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200652025-03-07T23:12:37.602ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200662025-03-07T23:12:37.602ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 39523d6c-b9db-47c4-84cc-987bcfb576fb uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200672025-03-07T23:12:37.602ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 39523d6c-b9db-47c4-84cc-987bcfb576fb response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200682025-03-07T23:12:37.602ZINFOtest_unauthorized (external client test context): client received response status = 405
200692025-03-07T23:12:37.603ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200702025-03-07T23:12:37.604ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200712025-03-07T23:12:37.604ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1ca35be6-f601-4608-b39e-7bc67666c8fa uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200722025-03-07T23:12:37.604ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1ca35be6-f601-4608-b39e-7bc67666c8fa response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200732025-03-07T23:12:37.604ZINFOtest_unauthorized (external client test context): client received response status = 405
200742025-03-07T23:12:37.604ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
200752025-03-07T23:12:37.604ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200762025-03-07T23:12:37.604ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200772025-03-07T23:12:37.604ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200782025-03-07T23:12:37.604ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
200792025-03-07T23:12:37.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
200802025-03-07T23:12:37.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
200812025-03-07T23:12:37.605ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
200822025-03-07T23:12:37.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
200832025-03-07T23:12:37.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
200842025-03-07T23:12:37.610ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
200852025-03-07T23:12:37.615ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
200862025-03-07T23:12:37.616ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
200872025-03-07T23:12:37.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
200882025-03-07T23:12:37.616ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
200892025-03-07T23:12:37.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
200902025-03-07T23:12:37.623ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
200912025-03-07T23:12:37.623ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
200922025-03-07T23:12:37.624ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
200932025-03-07T23:12:37.624ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
200942025-03-07T23:12:37.625ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
200952025-03-07T23:12:37.625ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
200962025-03-07T23:12:37.625ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
200972025-03-07T23:12:37.625ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
200982025-03-07T23:12:37.625ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
200992025-03-07T23:12:37.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201002025-03-07T23:12:37.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
201012025-03-07T23:12:37.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
201022025-03-07T23:12:37.629ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201032025-03-07T23:12:37.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201042025-03-07T23:12:37.630ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201052025-03-07T23:12:37.633ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
201062025-03-07T23:12:37.633ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
201072025-03-07T23:12:37.633ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201082025-03-07T23:12:37.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201092025-03-07T23:12:37.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201102025-03-07T23:12:37.640ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
201112025-03-07T23:12:37.640ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201122025-03-07T23:12:37.644ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201132025-03-07T23:12:37.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201142025-03-07T23:12:37.648ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
201152025-03-07T23:12:37.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
201162025-03-07T23:12:37.659ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201172025-03-07T23:12:37.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201182025-03-07T23:12:37.659ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201192025-03-07T23:12:37.659ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201202025-03-07T23:12:37.670ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201212025-03-07T23:12:37.670ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201222025-03-07T23:12:37.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201232025-03-07T23:12:37.672ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201242025-03-07T23:12:37.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201252025-03-07T23:12:37.674ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201262025-03-07T23:12:37.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201272025-03-07T23:12:37.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201282025-03-07T23:12:37.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201292025-03-07T23:12:37.678ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201302025-03-07T23:12:37.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201312025-03-07T23:12:37.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201322025-03-07T23:12:37.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201332025-03-07T23:12:37.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201342025-03-07T23:12:37.685ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201352025-03-07T23:12:37.687ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201362025-03-07T23:12:37.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201372025-03-07T23:12:37.688ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201382025-03-07T23:12:37.689ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201392025-03-07T23:12:37.689ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201402025-03-07T23:12:37.689ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201412025-03-07T23:12:37.689ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201422025-03-07T23:12:37.698ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201432025-03-07T23:12:37.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201442025-03-07T23:12:37.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201452025-03-07T23:12:37.700ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201462025-03-07T23:12:37.714ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
201472025-03-07T23:12:37.714ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201482025-03-07T23:12:37.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } result = Err(Forbidden) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201492025-03-07T23:12:37.727ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 124353 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2e6d2c4-652d-428a-b632-1c05d264f597 response_code = 403 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201502025-03-07T23:12:37.728ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
201512025-03-07T23:12:37.728ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
201522025-03-07T23:12:37.728ZINFOtest_unauthorized (external client test context): client received response status = 403
201532025-03-07T23:12:37.731ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201542025-03-07T23:12:37.731ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201552025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201562025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201572025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201582025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201592025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201602025-03-07T23:12:37.731ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201612025-03-07T23:12:37.731ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201622025-03-07T23:12:37.731ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 947 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9a55367d-4bae-497e-843f-95089b96fdd0 response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201632025-03-07T23:12:37.731ZINFOtest_unauthorized (external client test context): client received response status = 401
201642025-03-07T23:12:37.731ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201652025-03-07T23:12:37.731ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201662025-03-07T23:12:37.731ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9648e0c4-0504-4587-9c23-c88bcebe01a4 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201672025-03-07T23:12:37.732ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9648e0c4-0504-4587-9c23-c88bcebe01a4 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201682025-03-07T23:12:37.732ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9648e0c4-0504-4587-9c23-c88bcebe01a4 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201692025-03-07T23:12:37.732ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 201 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9648e0c4-0504-4587-9c23-c88bcebe01a4 response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201702025-03-07T23:12:37.732ZINFOtest_unauthorized (external client test context): client received response status = 401
201712025-03-07T23:12:37.732ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201722025-03-07T23:12:37.732ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201732025-03-07T23:12:37.733ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca47777f-acd3-4a19-8060-b807efa03e5a uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201742025-03-07T23:12:37.733ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca47777f-acd3-4a19-8060-b807efa03e5a uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201752025-03-07T23:12:37.735ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:777:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:791:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca47777f-acd3-4a19-8060-b807efa03e5a uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201762025-03-07T23:12:37.735ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1577 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ca47777f-acd3-4a19-8060-b807efa03e5a response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201772025-03-07T23:12:37.735ZINFOtest_unauthorized (external client test context): client received response status = 401
201782025-03-07T23:12:37.735ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201792025-03-07T23:12:37.735ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201802025-03-07T23:12:37.735ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 406b6619-de0c-4e2d-a428-1cb9eb2a217f uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201812025-03-07T23:12:37.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 3682 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 406b6619-de0c-4e2d-a428-1cb9eb2a217f response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201822025-03-07T23:12:37.740ZINFOtest_unauthorized (external client test context): client received response status = 405
201832025-03-07T23:12:37.740ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201842025-03-07T23:12:37.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201852025-03-07T23:12:37.741ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 25dcd21d-0caa-4520-a120-7b342efecf3c uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201862025-03-07T23:12:37.741ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 25dcd21d-0caa-4520-a120-7b342efecf3c response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201872025-03-07T23:12:37.741ZINFOtest_unauthorized (external client test context): client received response status = 405
201882025-03-07T23:12:37.741ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201892025-03-07T23:12:37.741ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201902025-03-07T23:12:37.742ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4bfc6e29-cbd7-44dd-804e-c934018cddb3 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201912025-03-07T23:12:37.742ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 684 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4bfc6e29-cbd7-44dd-804e-c934018cddb3 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201922025-03-07T23:12:37.743ZINFOtest_unauthorized (external client test context): client received response status = 405
201932025-03-07T23:12:37.743ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201942025-03-07T23:12:37.743ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201952025-03-07T23:12:37.744ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d1b0837b-9bd1-49f4-9e65-326215318cf9 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201962025-03-07T23:12:37.744ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d1b0837b-9bd1-49f4-9e65-326215318cf9 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da?silo=default-silo
201972025-03-07T23:12:37.744ZINFOtest_unauthorized (external client test context): client received response status = 405
201982025-03-07T23:12:37.744ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201992025-03-07T23:12:37.744ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202002025-03-07T23:12:37.744ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202012025-03-07T23:12:37.744ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202022025-03-07T23:12:37.744ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202032025-03-07T23:12:37.745ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202042025-03-07T23:12:37.745ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ddaf14b6-152c-4a31-a66a-e6193e8969f8 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202052025-03-07T23:12:37.745ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 179 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ddaf14b6-152c-4a31-a66a-e6193e8969f8 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202062025-03-07T23:12:37.745ZINFOtest_unauthorized (external client test context): client received response status = 405
202072025-03-07T23:12:37.746ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202082025-03-07T23:12:37.746ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202092025-03-07T23:12:37.746ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 88bb66ea-56fe-431f-a0fa-02d1bf11122a uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202102025-03-07T23:12:37.747ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 155 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 88bb66ea-56fe-431f-a0fa-02d1bf11122a response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202112025-03-07T23:12:37.747ZINFOtest_unauthorized (external client test context): client received response status = 405
202122025-03-07T23:12:37.747ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202132025-03-07T23:12:37.747ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202142025-03-07T23:12:37.747ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 425fca0e-6dc1-47ac-bae3-f194d743f257 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202152025-03-07T23:12:37.747ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 425fca0e-6dc1-47ac-bae3-f194d743f257 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202162025-03-07T23:12:37.747ZINFOtest_unauthorized (external client test context): client received response status = 405
202172025-03-07T23:12:37.748ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202182025-03-07T23:12:37.748ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202192025-03-07T23:12:37.748ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 39397677-00bd-4928-9598-1511ce2dfdf8 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202202025-03-07T23:12:37.749ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 205 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 39397677-00bd-4928-9598-1511ce2dfdf8 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202212025-03-07T23:12:37.750ZINFOtest_unauthorized (external client test context): client received response status = 405
202222025-03-07T23:12:37.750ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202232025-03-07T23:12:37.750ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202242025-03-07T23:12:37.750ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9d055ee0-ecdd-435b-a015-ea86b68e64b8 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202252025-03-07T23:12:37.750ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9d055ee0-ecdd-435b-a015-ea86b68e64b8 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202262025-03-07T23:12:37.750ZINFOtest_unauthorized (external client test context): client received response status = 405
202272025-03-07T23:12:37.750ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202282025-03-07T23:12:37.750ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202292025-03-07T23:12:37.750ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d2d0ff91-9291-41ac-945e-99c0fed80eee uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202302025-03-07T23:12:37.751ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 297 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d2d0ff91-9291-41ac-945e-99c0fed80eee response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202312025-03-07T23:12:37.752ZINFOtest_unauthorized (external client test context): client received response status = 405
202322025-03-07T23:12:37.752ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202332025-03-07T23:12:37.752ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202342025-03-07T23:12:37.752ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 92fc8b72-77bb-41f2-93bb-d12b0e31c7f9 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202352025-03-07T23:12:37.752ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 92fc8b72-77bb-41f2-93bb-d12b0e31c7f9 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202362025-03-07T23:12:37.752ZINFOtest_unauthorized (external client test context): client received response status = 405
202372025-03-07T23:12:37.752ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
202382025-03-07T23:12:37.752ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202392025-03-07T23:12:37.752ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202402025-03-07T23:12:37.753ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202412025-03-07T23:12:37.753ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202422025-03-07T23:12:37.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202432025-03-07T23:12:37.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202442025-03-07T23:12:37.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202452025-03-07T23:12:37.756ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202462025-03-07T23:12:37.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202472025-03-07T23:12:37.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202482025-03-07T23:12:37.764ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
202492025-03-07T23:12:37.764ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
202502025-03-07T23:12:37.764ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202512025-03-07T23:12:37.764ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202522025-03-07T23:12:37.765ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202532025-03-07T23:12:37.767ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
202542025-03-07T23:12:37.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202552025-03-07T23:12:37.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202562025-03-07T23:12:37.769ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202572025-03-07T23:12:37.783ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
202582025-03-07T23:12:37.789ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
202592025-03-07T23:12:37.789ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202602025-03-07T23:12:37.790ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202612025-03-07T23:12:37.790ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202622025-03-07T23:12:37.793ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
202632025-03-07T23:12:37.793ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
202642025-03-07T23:12:37.793ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202652025-03-07T23:12:37.793ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202662025-03-07T23:12:37.796ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202672025-03-07T23:12:37.801ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
202682025-03-07T23:12:37.801ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202692025-03-07T23:12:37.801ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202702025-03-07T23:12:37.802ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202712025-03-07T23:12:37.805ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
202722025-03-07T23:12:37.809ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
202732025-03-07T23:12:37.809ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202742025-03-07T23:12:37.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202752025-03-07T23:12:37.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202762025-03-07T23:12:37.810ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202772025-03-07T23:12:37.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202782025-03-07T23:12:37.830ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202792025-03-07T23:12:37.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202802025-03-07T23:12:37.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202812025-03-07T23:12:37.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202822025-03-07T23:12:37.841ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202832025-03-07T23:12:37.842ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202842025-03-07T23:12:37.842ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202852025-03-07T23:12:37.843ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202862025-03-07T23:12:37.852ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202872025-03-07T23:12:37.855ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202882025-03-07T23:12:37.856ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202892025-03-07T23:12:37.856ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202902025-03-07T23:12:37.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202912025-03-07T23:12:37.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202922025-03-07T23:12:37.864ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202932025-03-07T23:12:37.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202942025-03-07T23:12:37.872ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202952025-03-07T23:12:37.872ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202962025-03-07T23:12:37.872ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202972025-03-07T23:12:37.872ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202982025-03-07T23:12:37.873ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
202992025-03-07T23:12:37.876ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203002025-03-07T23:12:37.876ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203012025-03-07T23:12:37.876ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203022025-03-07T23:12:37.877ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203032025-03-07T23:12:37.885ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203042025-03-07T23:12:37.896ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 0db0e5d6-7cbc-4872-817a-8ec5482435da, lookup_type: ById(0db0e5d6-7cbc-4872-817a-8ec5482435da) } result = Err(Forbidden) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203052025-03-07T23:12:37.897ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 144702 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a72a14c-5319-44b3-9289-24810e4a05a7 response_code = 403 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203062025-03-07T23:12:37.897ZINFOtest_unauthorized (external client test context): client received response status = 403
203072025-03-07T23:12:37.898ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203082025-03-07T23:12:37.898ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203092025-03-07T23:12:37.898ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203102025-03-07T23:12:37.898ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203112025-03-07T23:12:37.898ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203122025-03-07T23:12:37.898ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203132025-03-07T23:12:37.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 resource = Database uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203142025-03-07T23:12:37.898ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203152025-03-07T23:12:37.899ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203162025-03-07T23:12:37.904ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1635 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3906010-f9d9-4729-8b0c-ae5a8b9cbf04 response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203172025-03-07T23:12:37.915ZINFOtest_unauthorized (external client test context): client received response status = 401
203182025-03-07T23:12:37.916ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203192025-03-07T23:12:37.916ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203202025-03-07T23:12:37.918ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4f5868ce-d1b9-4eb8-a6b1-d0cad8e3ae7d uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203212025-03-07T23:12:37.918ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4f5868ce-d1b9-4eb8-a6b1-d0cad8e3ae7d uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203222025-03-07T23:12:37.918ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4f5868ce-d1b9-4eb8-a6b1-d0cad8e3ae7d uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203232025-03-07T23:12:37.918ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 402 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4f5868ce-d1b9-4eb8-a6b1-d0cad8e3ae7d response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203242025-03-07T23:12:37.918ZINFOtest_unauthorized (external client test context): client received response status = 401
203252025-03-07T23:12:37.918ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203262025-03-07T23:12:37.918ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203272025-03-07T23:12:37.918ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5855bc83-29f8-47dc-8f29-83ab4f5e52bc uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203282025-03-07T23:12:37.918ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5855bc83-29f8-47dc-8f29-83ab4f5e52bc uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203292025-03-07T23:12:37.920ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:803:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:822:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5855bc83-29f8-47dc-8f29-83ab4f5e52bc uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203302025-03-07T23:12:37.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1722 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5855bc83-29f8-47dc-8f29-83ab4f5e52bc response_code = 401 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203312025-03-07T23:12:37.920ZINFOtest_unauthorized (external client test context): client received response status = 401
203322025-03-07T23:12:37.920ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203332025-03-07T23:12:37.920ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203342025-03-07T23:12:37.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ecda195b-b051-4e5d-b858-b51ebf506132 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203352025-03-07T23:12:37.931ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 173 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ecda195b-b051-4e5d-b858-b51ebf506132 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203362025-03-07T23:12:37.932ZINFOtest_unauthorized (external client test context): client received response status = 405
203372025-03-07T23:12:37.932ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203382025-03-07T23:12:37.932ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203392025-03-07T23:12:37.933ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 91877225-a8da-4080-a501-0497840fae33 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203402025-03-07T23:12:37.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 223 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 91877225-a8da-4080-a501-0497840fae33 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203412025-03-07T23:12:37.935ZINFOtest_unauthorized (external client test context): client received response status = 405
203422025-03-07T23:12:37.936ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203432025-03-07T23:12:37.936ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203442025-03-07T23:12:37.936ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f11239b4-0d7b-4080-aa77-eda04a137fee uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203452025-03-07T23:12:37.937ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 542 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f11239b4-0d7b-4080-aa77-eda04a137fee response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203462025-03-07T23:12:37.938ZINFOtest_unauthorized (external client test context): client received response status = 405
203472025-03-07T23:12:37.938ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203482025-03-07T23:12:37.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203492025-03-07T23:12:37.938ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6c7d9d11-09fa-4147-95eb-4fb4790de266 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203502025-03-07T23:12:37.938ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6c7d9d11-09fa-4147-95eb-4fb4790de266 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203512025-03-07T23:12:37.938ZINFOtest_unauthorized (external client test context): client received response status = 405
203522025-03-07T23:12:37.938ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203532025-03-07T23:12:37.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203542025-03-07T23:12:37.938ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 023673d1-24bb-4632-a587-5473fc0fe872 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203552025-03-07T23:12:37.939ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 023673d1-24bb-4632-a587-5473fc0fe872 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203562025-03-07T23:12:37.939ZINFOtest_unauthorized (external client test context): client received response status = 405
203572025-03-07T23:12:37.941ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203582025-03-07T23:12:37.941ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203592025-03-07T23:12:37.941ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8430e6d5-3b78-45b9-a977-20277b7fd14c uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203602025-03-07T23:12:37.941ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 411 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8430e6d5-3b78-45b9-a977-20277b7fd14c response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203612025-03-07T23:12:37.941ZINFOtest_unauthorized (external client test context): client received response status = 405
203622025-03-07T23:12:37.941ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203632025-03-07T23:12:37.941ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203642025-03-07T23:12:37.941ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8c312b62-5e7a-44cd-b54e-5b0309449b43 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203652025-03-07T23:12:37.941ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8c312b62-5e7a-44cd-b54e-5b0309449b43 response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203662025-03-07T23:12:37.941ZINFOtest_unauthorized (external client test context): client received response status = 405
203672025-03-07T23:12:37.941ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203682025-03-07T23:12:37.941ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203692025-03-07T23:12:37.942ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bb579fae-01bb-45cf-9dde-7abc08548f6b uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203702025-03-07T23:12:37.943ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 467 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bb579fae-01bb-45cf-9dde-7abc08548f6b response_code = 405 uri = /v1/system/identity-providers/local/users/0db0e5d6-7cbc-4872-817a-8ec5482435da/set-password?silo=default-silo
203712025-03-07T23:12:37.943ZINFOtest_unauthorized (external client test context): client received response status = 405
203722025-03-07T23:12:37.943ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203732025-03-07T23:12:37.943ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects
203742025-03-07T23:12:37.943ZINFOtest_unauthorized: test: privileged GET url = /v1/projects
203752025-03-07T23:12:37.943ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
203762025-03-07T23:12:37.943ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff uri = /v1/projects
203772025-03-07T23:12:37.943ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff uri = /v1/projects
203782025-03-07T23:12:37.943ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
203792025-03-07T23:12:37.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203802025-03-07T23:12:37.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203812025-03-07T23:12:37.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203822025-03-07T23:12:37.948ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203832025-03-07T23:12:37.948ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203842025-03-07T23:12:37.949ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203852025-03-07T23:12:37.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
203862025-03-07T23:12:37.954ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
203872025-03-07T23:12:37.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203882025-03-07T23:12:37.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203892025-03-07T23:12:37.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203902025-03-07T23:12:37.957ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
203912025-03-07T23:12:37.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203922025-03-07T23:12:37.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203932025-03-07T23:12:37.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203942025-03-07T23:12:37.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
203952025-03-07T23:12:37.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
203962025-03-07T23:12:37.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203972025-03-07T23:12:37.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203982025-03-07T23:12:37.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203992025-03-07T23:12:37.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
204002025-03-07T23:12:37.967ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
204012025-03-07T23:12:37.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204022025-03-07T23:12:37.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204032025-03-07T23:12:37.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204042025-03-07T23:12:37.975ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
204052025-03-07T23:12:37.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204062025-03-07T23:12:37.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204072025-03-07T23:12:37.978ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204082025-03-07T23:12:37.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
204092025-03-07T23:12:37.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
204102025-03-07T23:12:37.985ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff uri = /v1/projects
204112025-03-07T23:12:37.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
204122025-03-07T23:12:37.986ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
204132025-03-07T23:12:37.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database uri = /v1/projects
204142025-03-07T23:12:37.986ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff roles = RoleSet { roles: {} } uri = /v1/projects
204152025-03-07T23:12:37.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database result = Ok(()) uri = /v1/projects
204162025-03-07T23:12:37.987ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
204172025-03-07T23:12:37.987ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database uri = /v1/projects
204182025-03-07T23:12:37.987ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff roles = RoleSet { roles: {} } uri = /v1/projects
204192025-03-07T23:12:37.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database result = Ok(()) uri = /v1/projects
204202025-03-07T23:12:37.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
204212025-03-07T23:12:38.003ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
204222025-03-07T23:12:38.003ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database uri = /v1/projects
204232025-03-07T23:12:38.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff roles = RoleSet { roles: {} } uri = /v1/projects
204242025-03-07T23:12:38.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff resource = Database result = Ok(()) uri = /v1/projects
204252025-03-07T23:12:38.008ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 66114 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f167a470-251f-4ef5-af1c-69d7bdfdefff response_code = 200 uri = /v1/projects
204262025-03-07T23:12:38.009ZINFOtest_unauthorized (external client test context): client received response status = 200
204272025-03-07T23:12:38.010ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects
204282025-03-07T23:12:38.010ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
204292025-03-07T23:12:38.010ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a uri = /v1/projects
204302025-03-07T23:12:38.010ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a uri = /v1/projects
204312025-03-07T23:12:38.010ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects
204322025-03-07T23:12:38.010ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204332025-03-07T23:12:38.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204342025-03-07T23:12:38.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204352025-03-07T23:12:38.016ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204362025-03-07T23:12:38.017ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204372025-03-07T23:12:38.017ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204382025-03-07T23:12:38.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
204392025-03-07T23:12:38.022ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
204402025-03-07T23:12:38.022ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204412025-03-07T23:12:38.022ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204422025-03-07T23:12:38.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204432025-03-07T23:12:38.045ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
204442025-03-07T23:12:38.045ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204452025-03-07T23:12:38.045ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204462025-03-07T23:12:38.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204472025-03-07T23:12:38.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
204482025-03-07T23:12:38.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
204492025-03-07T23:12:38.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204502025-03-07T23:12:38.064ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204512025-03-07T23:12:38.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204522025-03-07T23:12:38.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
204532025-03-07T23:12:38.067ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
204542025-03-07T23:12:38.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204552025-03-07T23:12:38.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204562025-03-07T23:12:38.068ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204572025-03-07T23:12:38.071ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
204582025-03-07T23:12:38.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204592025-03-07T23:12:38.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204602025-03-07T23:12:38.073ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204612025-03-07T23:12:38.075ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
204622025-03-07T23:12:38.081ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
204632025-03-07T23:12:38.081ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a uri = /v1/projects
204642025-03-07T23:12:38.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
204652025-03-07T23:12:38.082ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
204662025-03-07T23:12:38.082ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Database uri = /v1/projects
204672025-03-07T23:12:38.082ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a roles = RoleSet { roles: {} } uri = /v1/projects
204682025-03-07T23:12:38.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Database result = Ok(()) uri = /v1/projects
204692025-03-07T23:12:38.088ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
204702025-03-07T23:12:38.089ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Database uri = /v1/projects
204712025-03-07T23:12:38.089ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a roles = RoleSet { roles: {} } uri = /v1/projects
204722025-03-07T23:12:38.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Database result = Ok(()) uri = /v1/projects
204732025-03-07T23:12:38.095ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a roles = RoleSet { roles: {} } uri = /v1/projects
204742025-03-07T23:12:38.109ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/projects
204752025-03-07T23:12:38.110ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 99770 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 81d7c760-9412-466d-b553-f3b030d26c4a response_code = 403 uri = /v1/projects
204762025-03-07T23:12:38.110ZINFOtest_unauthorized (external client test context): client received response status = 403
204772025-03-07T23:12:38.110ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects
204782025-03-07T23:12:38.110ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
204792025-03-07T23:12:38.110ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea3dd4e6-9e9e-454d-8985-84bdfcc7d470 uri = /v1/projects
204802025-03-07T23:12:38.110ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea3dd4e6-9e9e-454d-8985-84bdfcc7d470 uri = /v1/projects
204812025-03-07T23:12:38.112ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea3dd4e6-9e9e-454d-8985-84bdfcc7d470 uri = /v1/projects
204822025-03-07T23:12:38.112ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea3dd4e6-9e9e-454d-8985-84bdfcc7d470 uri = /v1/projects
204832025-03-07T23:12:38.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing Projects: Actor required latency_us = 271 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea3dd4e6-9e9e-454d-8985-84bdfcc7d470 response_code = 401 uri = /v1/projects
204842025-03-07T23:12:38.113ZINFOtest_unauthorized (external client test context): client received response status = 401
204852025-03-07T23:12:38.113ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects
204862025-03-07T23:12:38.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
204872025-03-07T23:12:38.113ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2a902ed8-9929-4b0a-860b-25e41e845891 uri = /v1/projects
204882025-03-07T23:12:38.113ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2a902ed8-9929-4b0a-860b-25e41e845891 uri = /v1/projects
204892025-03-07T23:12:38.113ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2a902ed8-9929-4b0a-860b-25e41e845891 uri = /v1/projects
204902025-03-07T23:12:38.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 152 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2a902ed8-9929-4b0a-860b-25e41e845891 response_code = 401 uri = /v1/projects
204912025-03-07T23:12:38.113ZINFOtest_unauthorized (external client test context): client received response status = 401
204922025-03-07T23:12:38.113ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects
204932025-03-07T23:12:38.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
204942025-03-07T23:12:38.115ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00a270ed-58f9-43f5-82bc-9bef028fb938 uri = /v1/projects
204952025-03-07T23:12:38.115ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00a270ed-58f9-43f5-82bc-9bef028fb938 uri = /v1/projects
204962025-03-07T23:12:38.115ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:837:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:854:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00a270ed-58f9-43f5-82bc-9bef028fb938 uri = /v1/projects
204972025-03-07T23:12:38.115ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 840 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00a270ed-58f9-43f5-82bc-9bef028fb938 response_code = 401 uri = /v1/projects
204982025-03-07T23:12:38.115ZINFOtest_unauthorized (external client test context): client received response status = 401
204992025-03-07T23:12:38.115ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects
205002025-03-07T23:12:38.115ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects
205012025-03-07T23:12:38.115ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b4347740-397c-4d78-a0c0-fd9706d13d8a uri = /v1/projects
205022025-03-07T23:12:38.115ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b4347740-397c-4d78-a0c0-fd9706d13d8a response_code = 405 uri = /v1/projects
205032025-03-07T23:12:38.115ZINFOtest_unauthorized (external client test context): client received response status = 405
205042025-03-07T23:12:38.116ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects
205052025-03-07T23:12:38.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects
205062025-03-07T23:12:38.116ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 59959c59-0b35-4a60-b9a1-e69bf7e79657 uri = /v1/projects
205072025-03-07T23:12:38.119ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 59959c59-0b35-4a60-b9a1-e69bf7e79657 response_code = 405 uri = /v1/projects
205082025-03-07T23:12:38.119ZINFOtest_unauthorized (external client test context): client received response status = 405
205092025-03-07T23:12:38.119ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects
205102025-03-07T23:12:38.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects
205112025-03-07T23:12:38.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 16e01b65-55b4-4692-8242-c7e11dd3839a uri = /v1/projects
205122025-03-07T23:12:38.119ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 16e01b65-55b4-4692-8242-c7e11dd3839a response_code = 405 uri = /v1/projects
205132025-03-07T23:12:38.119ZINFOtest_unauthorized (external client test context): client received response status = 405
205142025-03-07T23:12:38.119ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects
205152025-03-07T23:12:38.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects
205162025-03-07T23:12:38.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e7781d61-3852-40d2-8235-831247f0200e uri = /v1/projects
205172025-03-07T23:12:38.119ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e7781d61-3852-40d2-8235-831247f0200e response_code = 405 uri = /v1/projects
205182025-03-07T23:12:38.121ZINFOtest_unauthorized (external client test context): client received response status = 405
205192025-03-07T23:12:38.126ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects
205202025-03-07T23:12:38.128ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects
205212025-03-07T23:12:38.128ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada uri = /v1/projects
205222025-03-07T23:12:38.128ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada uri = /v1/projects
205232025-03-07T23:12:38.128ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects
205242025-03-07T23:12:38.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205252025-03-07T23:12:38.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205262025-03-07T23:12:38.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205272025-03-07T23:12:38.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205282025-03-07T23:12:38.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205292025-03-07T23:12:38.130ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205302025-03-07T23:12:38.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
205312025-03-07T23:12:38.130ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
205322025-03-07T23:12:38.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205332025-03-07T23:12:38.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205342025-03-07T23:12:38.130ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205352025-03-07T23:12:38.131ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
205362025-03-07T23:12:38.132ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205372025-03-07T23:12:38.132ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205382025-03-07T23:12:38.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205392025-03-07T23:12:38.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
205402025-03-07T23:12:38.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
205412025-03-07T23:12:38.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205422025-03-07T23:12:38.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205432025-03-07T23:12:38.142ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205442025-03-07T23:12:38.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
205452025-03-07T23:12:38.143ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
205462025-03-07T23:12:38.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205472025-03-07T23:12:38.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205482025-03-07T23:12:38.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205492025-03-07T23:12:38.147ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
205502025-03-07T23:12:38.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205512025-03-07T23:12:38.149ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205522025-03-07T23:12:38.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205532025-03-07T23:12:38.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
205542025-03-07T23:12:38.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
205552025-03-07T23:12:38.159ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada uri = /v1/projects
205562025-03-07T23:12:38.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
205572025-03-07T23:12:38.161ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
205582025-03-07T23:12:38.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Database uri = /v1/projects
205592025-03-07T23:12:38.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada roles = RoleSet { roles: {} } uri = /v1/projects
205602025-03-07T23:12:38.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Database result = Ok(()) uri = /v1/projects
205612025-03-07T23:12:38.170ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
205622025-03-07T23:12:38.170ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Database uri = /v1/projects
205632025-03-07T23:12:38.171ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada roles = RoleSet { roles: {} } uri = /v1/projects
205642025-03-07T23:12:38.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Database result = Ok(()) uri = /v1/projects
205652025-03-07T23:12:38.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada roles = RoleSet { roles: {} } uri = /v1/projects
205662025-03-07T23:12:38.190ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/projects
205672025-03-07T23:12:38.190ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 74599 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e3b552d-fcdc-49e3-86b7-6cc4154e2ada response_code = 403 uri = /v1/projects
205682025-03-07T23:12:38.191ZINFOtest_unauthorized (external client test context): client received response status = 403
205692025-03-07T23:12:38.191ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects
205702025-03-07T23:12:38.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects
205712025-03-07T23:12:38.192ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87e26982-2651-4d75-885b-324dd732b150 uri = /v1/projects
205722025-03-07T23:12:38.192ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87e26982-2651-4d75-885b-324dd732b150 uri = /v1/projects
205732025-03-07T23:12:38.192ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87e26982-2651-4d75-885b-324dd732b150 uri = /v1/projects
205742025-03-07T23:12:38.193ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87e26982-2651-4d75-885b-324dd732b150 uri = /v1/projects
205752025-03-07T23:12:38.193ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = creating a Project: Actor required latency_us = 420 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 87e26982-2651-4d75-885b-324dd732b150 response_code = 401 uri = /v1/projects
205762025-03-07T23:12:38.193ZINFOtest_unauthorized (external client test context): client received response status = 401
205772025-03-07T23:12:38.193ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects
205782025-03-07T23:12:38.193ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects
205792025-03-07T23:12:38.193ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70b0c851-64b6-4d21-a831-f78ae96259d6 uri = /v1/projects
205802025-03-07T23:12:38.193ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70b0c851-64b6-4d21-a831-f78ae96259d6 uri = /v1/projects
205812025-03-07T23:12:38.193ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70b0c851-64b6-4d21-a831-f78ae96259d6 uri = /v1/projects
205822025-03-07T23:12:38.194ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 233 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70b0c851-64b6-4d21-a831-f78ae96259d6 response_code = 401 uri = /v1/projects
205832025-03-07T23:12:38.194ZINFOtest_unauthorized (external client test context): client received response status = 401
205842025-03-07T23:12:38.194ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects
205852025-03-07T23:12:38.194ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects
205862025-03-07T23:12:38.194ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 00578758-e823-4f67-82c6-4da6eded4899 uri = /v1/projects
205872025-03-07T23:12:38.194ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 00578758-e823-4f67-82c6-4da6eded4899 uri = /v1/projects
205882025-03-07T23:12:38.207ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:865:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:874:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 00578758-e823-4f67-82c6-4da6eded4899 uri = /v1/projects
205892025-03-07T23:12:38.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 960 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 00578758-e823-4f67-82c6-4da6eded4899 response_code = 401 uri = /v1/projects
205902025-03-07T23:12:38.208ZINFOtest_unauthorized (external client test context): client received response status = 401
205912025-03-07T23:12:38.208ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects
205922025-03-07T23:12:38.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects
205932025-03-07T23:12:38.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 847eb872-90dc-46ee-a068-865134636223 uri = /v1/projects
205942025-03-07T23:12:38.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 847eb872-90dc-46ee-a068-865134636223 response_code = 405 uri = /v1/projects
205952025-03-07T23:12:38.208ZINFOtest_unauthorized (external client test context): client received response status = 405
205962025-03-07T23:12:38.209ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects
205972025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects
205982025-03-07T23:12:38.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ae59e95e-bbfd-4dca-a0cb-d68ede1120f3 uri = /v1/projects
205992025-03-07T23:12:38.209ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ae59e95e-bbfd-4dca-a0cb-d68ede1120f3 response_code = 405 uri = /v1/projects
206002025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client received response status = 405
206012025-03-07T23:12:38.209ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects
206022025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects
206032025-03-07T23:12:38.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 308b88bd-db7c-4743-8fc2-94a6a3d205ad uri = /v1/projects
206042025-03-07T23:12:38.209ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 308b88bd-db7c-4743-8fc2-94a6a3d205ad response_code = 405 uri = /v1/projects
206052025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client received response status = 405
206062025-03-07T23:12:38.209ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects
206072025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects
206082025-03-07T23:12:38.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 924426e6-3439-4ddf-be8a-e01c82b34bde uri = /v1/projects
206092025-03-07T23:12:38.209ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 924426e6-3439-4ddf-be8a-e01c82b34bde response_code = 405 uri = /v1/projects
206102025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client received response status = 405
206112025-03-07T23:12:38.209ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects
206122025-03-07T23:12:38.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects
206132025-03-07T23:12:38.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7a1169d8-3372-4608-a9b2-f939d4e53279 uri = /v1/projects
206142025-03-07T23:12:38.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7a1169d8-3372-4608-a9b2-f939d4e53279 response_code = 405 uri = /v1/projects
206152025-03-07T23:12:38.210ZINFOtest_unauthorized (external client test context): client received response status = 405
206162025-03-07T23:12:38.210ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects
206172025-03-07T23:12:38.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects
206182025-03-07T23:12:38.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 56ad8b30-7a51-468b-adcb-c01f989b7806 uri = /v1/projects
206192025-03-07T23:12:38.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 56ad8b30-7a51-468b-adcb-c01f989b7806 response_code = 405 uri = /v1/projects
206202025-03-07T23:12:38.210ZINFOtest_unauthorized (external client test context): client received response status = 405
206212025-03-07T23:12:38.212ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects
206222025-03-07T23:12:38.212ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects
206232025-03-07T23:12:38.212ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cef05c78-18e3-4bc7-a8e0-ef16baff86dc uri = /v1/projects
206242025-03-07T23:12:38.212ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cef05c78-18e3-4bc7-a8e0-ef16baff86dc response_code = 405 uri = /v1/projects
206252025-03-07T23:12:38.212ZINFOtest_unauthorized (external client test context): client received response status = 405
206262025-03-07T23:12:38.212ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects
206272025-03-07T23:12:38.214ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects
206282025-03-07T23:12:38.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd10a90d-fc38-4cac-a18f-fc5d0e30d0d1 uri = /v1/projects
206292025-03-07T23:12:38.214ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd10a90d-fc38-4cac-a18f-fc5d0e30d0d1 response_code = 405 uri = /v1/projects
206302025-03-07T23:12:38.214ZINFOtest_unauthorized (external client test context): client received response status = 405
206312025-03-07T23:12:38.214ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects
206322025-03-07T23:12:38.214ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects
206332025-03-07T23:12:38.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 uri = /v1/projects
206342025-03-07T23:12:38.214ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 uri = /v1/projects
206352025-03-07T23:12:38.216ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
206362025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206372025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206382025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206392025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206402025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206412025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206422025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
206432025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
206442025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206452025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206462025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206472025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
206482025-03-07T23:12:38.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206492025-03-07T23:12:38.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206502025-03-07T23:12:38.218ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206512025-03-07T23:12:38.218ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
206522025-03-07T23:12:38.222ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
206532025-03-07T23:12:38.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206542025-03-07T23:12:38.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206552025-03-07T23:12:38.223ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206562025-03-07T23:12:38.223ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
206572025-03-07T23:12:38.223ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
206582025-03-07T23:12:38.223ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
206592025-03-07T23:12:38.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
206602025-03-07T23:12:38.225ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
206612025-03-07T23:12:38.225ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
206622025-03-07T23:12:38.225ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206632025-03-07T23:12:38.225ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206642025-03-07T23:12:38.226ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206652025-03-07T23:12:38.227ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
206662025-03-07T23:12:38.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
206672025-03-07T23:12:38.231ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
206682025-03-07T23:12:38.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206692025-03-07T23:12:38.231ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206702025-03-07T23:12:38.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206712025-03-07T23:12:38.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
206722025-03-07T23:12:38.236ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
206732025-03-07T23:12:38.237ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 uri = /v1/projects
206742025-03-07T23:12:38.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
206752025-03-07T23:12:38.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
206762025-03-07T23:12:38.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database uri = /v1/projects
206772025-03-07T23:12:38.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 roles = RoleSet { roles: {} } uri = /v1/projects
206782025-03-07T23:12:38.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database result = Ok(()) uri = /v1/projects
206792025-03-07T23:12:38.240ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
206802025-03-07T23:12:38.240ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database uri = /v1/projects
206812025-03-07T23:12:38.240ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 roles = RoleSet { roles: {} } uri = /v1/projects
206822025-03-07T23:12:38.241ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database result = Ok(()) uri = /v1/projects
206832025-03-07T23:12:38.242ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
206842025-03-07T23:12:38.242ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
206852025-03-07T23:12:38.245ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
206862025-03-07T23:12:38.249ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
206872025-03-07T23:12:38.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database uri = /v1/projects
206882025-03-07T23:12:38.250ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 roles = RoleSet { roles: {} } uri = /v1/projects
206892025-03-07T23:12:38.250ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 resource = Database result = Ok(()) uri = /v1/projects
206902025-03-07T23:12:38.254ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 54075 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ffbf5d5d-49bf-42ad-9b7d-2b1164a35bf2 response_code = 200 uri = /v1/projects
206912025-03-07T23:12:38.256ZINFOtest_unauthorized (external client test context): client received response status = 200
206922025-03-07T23:12:38.256ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects/demo-project
206932025-03-07T23:12:38.256ZINFOtest_unauthorized: test: privileged GET url = /v1/projects/demo-project
206942025-03-07T23:12:38.256ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
206952025-03-07T23:12:38.256ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b uri = /v1/projects/demo-project
206962025-03-07T23:12:38.256ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b uri = /v1/projects/demo-project
206972025-03-07T23:12:38.257ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project
206982025-03-07T23:12:38.257ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206992025-03-07T23:12:38.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207002025-03-07T23:12:38.258ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207012025-03-07T23:12:38.258ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207022025-03-07T23:12:38.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207032025-03-07T23:12:38.258ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207042025-03-07T23:12:38.260ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
207052025-03-07T23:12:38.261ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
207062025-03-07T23:12:38.261ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207072025-03-07T23:12:38.261ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207082025-03-07T23:12:38.262ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207092025-03-07T23:12:38.264ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
207102025-03-07T23:12:38.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207112025-03-07T23:12:38.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207122025-03-07T23:12:38.265ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207132025-03-07T23:12:38.268ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
207142025-03-07T23:12:38.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
207152025-03-07T23:12:38.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207162025-03-07T23:12:38.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207172025-03-07T23:12:38.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207182025-03-07T23:12:38.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
207192025-03-07T23:12:38.282ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
207202025-03-07T23:12:38.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207212025-03-07T23:12:38.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207222025-03-07T23:12:38.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207232025-03-07T23:12:38.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
207242025-03-07T23:12:38.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207252025-03-07T23:12:38.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207262025-03-07T23:12:38.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207272025-03-07T23:12:38.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
207282025-03-07T23:12:38.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
207292025-03-07T23:12:38.292ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b uri = /v1/projects/demo-project
207302025-03-07T23:12:38.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database uri = /v1/projects/demo-project
207312025-03-07T23:12:38.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207322025-03-07T23:12:38.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database result = Ok(()) uri = /v1/projects/demo-project
207332025-03-07T23:12:38.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database uri = /v1/projects/demo-project
207342025-03-07T23:12:38.294ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207352025-03-07T23:12:38.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database result = Ok(()) uri = /v1/projects/demo-project
207362025-03-07T23:12:38.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
207372025-03-07T23:12:38.298ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project
207382025-03-07T23:12:38.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database uri = /v1/projects/demo-project
207392025-03-07T23:12:38.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207402025-03-07T23:12:38.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database result = Ok(()) uri = /v1/projects/demo-project
207412025-03-07T23:12:38.309ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
207422025-03-07T23:12:38.312ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database uri = /v1/projects/demo-project
207432025-03-07T23:12:38.312ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207442025-03-07T23:12:38.312ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database result = Ok(()) uri = /v1/projects/demo-project
207452025-03-07T23:12:38.314ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
207462025-03-07T23:12:38.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database uri = /v1/projects/demo-project
207472025-03-07T23:12:38.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207482025-03-07T23:12:38.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Database result = Ok(()) uri = /v1/projects/demo-project
207492025-03-07T23:12:38.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project
207502025-03-07T23:12:38.329ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project
207512025-03-07T23:12:38.330ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 74847 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 04792ad1-498b-449a-b98d-3d255a02d11b response_code = 200 uri = /v1/projects/demo-project
207522025-03-07T23:12:38.330ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
207532025-03-07T23:12:38.330ZINFOtest_unauthorized (external client test context): client received response status = 200
207542025-03-07T23:12:38.330ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects/demo-project
207552025-03-07T23:12:38.331ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
207562025-03-07T23:12:38.331ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db uri = /v1/projects/demo-project
207572025-03-07T23:12:38.332ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db uri = /v1/projects/demo-project
207582025-03-07T23:12:38.333ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
207592025-03-07T23:12:38.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207602025-03-07T23:12:38.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207612025-03-07T23:12:38.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207622025-03-07T23:12:38.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207632025-03-07T23:12:38.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207642025-03-07T23:12:38.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207652025-03-07T23:12:38.337ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
207662025-03-07T23:12:38.337ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
207672025-03-07T23:12:38.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207682025-03-07T23:12:38.338ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207692025-03-07T23:12:38.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207702025-03-07T23:12:38.339ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
207712025-03-07T23:12:38.340ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207722025-03-07T23:12:38.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207732025-03-07T23:12:38.340ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207742025-03-07T23:12:38.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
207752025-03-07T23:12:38.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
207762025-03-07T23:12:38.348ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207772025-03-07T23:12:38.348ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207782025-03-07T23:12:38.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207792025-03-07T23:12:38.352ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
207802025-03-07T23:12:38.352ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
207812025-03-07T23:12:38.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207822025-03-07T23:12:38.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207832025-03-07T23:12:38.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207842025-03-07T23:12:38.355ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
207852025-03-07T23:12:38.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207862025-03-07T23:12:38.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207872025-03-07T23:12:38.357ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207882025-03-07T23:12:38.360ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
207892025-03-07T23:12:38.364ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
207902025-03-07T23:12:38.365ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db uri = /v1/projects/demo-project
207912025-03-07T23:12:38.365ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database uri = /v1/projects/demo-project
207922025-03-07T23:12:38.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207932025-03-07T23:12:38.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database result = Ok(()) uri = /v1/projects/demo-project
207942025-03-07T23:12:38.368ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database uri = /v1/projects/demo-project
207952025-03-07T23:12:38.369ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
207962025-03-07T23:12:38.369ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database result = Ok(()) uri = /v1/projects/demo-project
207972025-03-07T23:12:38.370ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
207982025-03-07T23:12:38.371ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project
207992025-03-07T23:12:38.371ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database uri = /v1/projects/demo-project
208002025-03-07T23:12:38.371ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208012025-03-07T23:12:38.372ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database result = Ok(()) uri = /v1/projects/demo-project
208022025-03-07T23:12:38.376ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
208032025-03-07T23:12:38.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database uri = /v1/projects/demo-project
208042025-03-07T23:12:38.376ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208052025-03-07T23:12:38.379ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database result = Ok(()) uri = /v1/projects/demo-project
208062025-03-07T23:12:38.382ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
208072025-03-07T23:12:38.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database uri = /v1/projects/demo-project
208082025-03-07T23:12:38.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208092025-03-07T23:12:38.383ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Database result = Ok(()) uri = /v1/projects/demo-project
208102025-03-07T23:12:38.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208112025-03-07T23:12:38.399ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
208122025-03-07T23:12:38.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 68187 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 416f0ad3-19c5-4e1d-974d-dd4a1ac432db response_code = 404 uri = /v1/projects/demo-project
208132025-03-07T23:12:38.400ZINFOtest_unauthorized (external client test context): client received response status = 404
208142025-03-07T23:12:38.401ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects/demo-project
208152025-03-07T23:12:38.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
208162025-03-07T23:12:38.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad84c082-5dbc-44ce-8766-5e7ab13fc29d uri = /v1/projects/demo-project
208172025-03-07T23:12:38.401ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad84c082-5dbc-44ce-8766-5e7ab13fc29d uri = /v1/projects/demo-project
208182025-03-07T23:12:38.401ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad84c082-5dbc-44ce-8766-5e7ab13fc29d uri = /v1/projects/demo-project
208192025-03-07T23:12:38.401ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad84c082-5dbc-44ce-8766-5e7ab13fc29d uri = /v1/projects/demo-project
208202025-03-07T23:12:38.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 287 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad84c082-5dbc-44ce-8766-5e7ab13fc29d response_code = 401 uri = /v1/projects/demo-project
208212025-03-07T23:12:38.401ZINFOtest_unauthorized (external client test context): client received response status = 401
208222025-03-07T23:12:38.402ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects/demo-project
208232025-03-07T23:12:38.403ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
208242025-03-07T23:12:38.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6a8d2469-0be1-44f5-b917-05967bc7fe4b uri = /v1/projects/demo-project
208252025-03-07T23:12:38.403ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6a8d2469-0be1-44f5-b917-05967bc7fe4b uri = /v1/projects/demo-project
208262025-03-07T23:12:38.403ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6a8d2469-0be1-44f5-b917-05967bc7fe4b uri = /v1/projects/demo-project
208272025-03-07T23:12:38.403ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 169 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6a8d2469-0be1-44f5-b917-05967bc7fe4b response_code = 401 uri = /v1/projects/demo-project
208282025-03-07T23:12:38.403ZINFOtest_unauthorized (external client test context): client received response status = 401
208292025-03-07T23:12:38.403ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects/demo-project
208302025-03-07T23:12:38.403ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
208312025-03-07T23:12:38.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6159edca-e8ab-447e-9259-2f6273ea500c uri = /v1/projects/demo-project
208322025-03-07T23:12:38.403ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6159edca-e8ab-447e-9259-2f6273ea500c uri = /v1/projects/demo-project
208332025-03-07T23:12:38.405ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:886:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:897:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6159edca-e8ab-447e-9259-2f6273ea500c uri = /v1/projects/demo-project
208342025-03-07T23:12:38.405ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2231 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6159edca-e8ab-447e-9259-2f6273ea500c response_code = 401 uri = /v1/projects/demo-project
208352025-03-07T23:12:38.405ZINFOtest_unauthorized (external client test context): client received response status = 401
208362025-03-07T23:12:38.405ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects/demo-project
208372025-03-07T23:12:38.405ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project
208382025-03-07T23:12:38.406ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf uri = /v1/projects/demo-project
208392025-03-07T23:12:38.406ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf uri = /v1/projects/demo-project
208402025-03-07T23:12:38.406ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
208412025-03-07T23:12:38.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208422025-03-07T23:12:38.406ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208432025-03-07T23:12:38.407ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208442025-03-07T23:12:38.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208452025-03-07T23:12:38.415ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208462025-03-07T23:12:38.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208472025-03-07T23:12:38.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
208482025-03-07T23:12:38.419ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208492025-03-07T23:12:38.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208502025-03-07T23:12:38.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208512025-03-07T23:12:38.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208522025-03-07T23:12:38.421ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208532025-03-07T23:12:38.422ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208542025-03-07T23:12:38.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208552025-03-07T23:12:38.423ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208562025-03-07T23:12:38.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208572025-03-07T23:12:38.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
208582025-03-07T23:12:38.437ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208592025-03-07T23:12:38.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208602025-03-07T23:12:38.438ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208612025-03-07T23:12:38.453ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
208622025-03-07T23:12:38.454ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208632025-03-07T23:12:38.454ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208642025-03-07T23:12:38.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208652025-03-07T23:12:38.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208662025-03-07T23:12:38.456ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208672025-03-07T23:12:38.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208682025-03-07T23:12:38.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208692025-03-07T23:12:38.457ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208702025-03-07T23:12:38.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208712025-03-07T23:12:38.461ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
208722025-03-07T23:12:38.462ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf uri = /v1/projects/demo-project
208732025-03-07T23:12:38.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database uri = /v1/projects/demo-project
208742025-03-07T23:12:38.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208752025-03-07T23:12:38.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database result = Ok(()) uri = /v1/projects/demo-project
208762025-03-07T23:12:38.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database uri = /v1/projects/demo-project
208772025-03-07T23:12:38.467ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208782025-03-07T23:12:38.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database result = Ok(()) uri = /v1/projects/demo-project
208792025-03-07T23:12:38.469ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
208802025-03-07T23:12:38.470ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project
208812025-03-07T23:12:38.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database uri = /v1/projects/demo-project
208822025-03-07T23:12:38.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208832025-03-07T23:12:38.471ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database result = Ok(()) uri = /v1/projects/demo-project
208842025-03-07T23:12:38.474ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
208852025-03-07T23:12:38.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database uri = /v1/projects/demo-project
208862025-03-07T23:12:38.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208872025-03-07T23:12:38.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database result = Ok(()) uri = /v1/projects/demo-project
208882025-03-07T23:12:38.477ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
208892025-03-07T23:12:38.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database uri = /v1/projects/demo-project
208902025-03-07T23:12:38.477ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208912025-03-07T23:12:38.479ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Database result = Ok(()) uri = /v1/projects/demo-project
208922025-03-07T23:12:38.481ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208932025-03-07T23:12:38.500ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
208942025-03-07T23:12:38.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 92177 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3744b1f1-c9a6-400d-ac69-45cf19bcc6cf response_code = 404 uri = /v1/projects/demo-project
208952025-03-07T23:12:38.500ZINFOtest_unauthorized (external client test context): client received response status = 404
208962025-03-07T23:12:38.501ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects/demo-project
208972025-03-07T23:12:38.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project
208982025-03-07T23:12:38.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 70b0331c-aa12-4f97-8862-7a2d74f4ac2c uri = /v1/projects/demo-project
208992025-03-07T23:12:38.501ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 70b0331c-aa12-4f97-8862-7a2d74f4ac2c uri = /v1/projects/demo-project
209002025-03-07T23:12:38.501ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 70b0331c-aa12-4f97-8862-7a2d74f4ac2c uri = /v1/projects/demo-project
209012025-03-07T23:12:38.501ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 70b0331c-aa12-4f97-8862-7a2d74f4ac2c uri = /v1/projects/demo-project
209022025-03-07T23:12:38.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 426 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 70b0331c-aa12-4f97-8862-7a2d74f4ac2c response_code = 401 uri = /v1/projects/demo-project
209032025-03-07T23:12:38.505ZINFOtest_unauthorized (external client test context): client received response status = 401
209042025-03-07T23:12:38.505ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects/demo-project
209052025-03-07T23:12:38.505ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project
209062025-03-07T23:12:38.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8153c882-f6d8-48aa-855e-cb8ab7235bc9 uri = /v1/projects/demo-project
209072025-03-07T23:12:38.507ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8153c882-f6d8-48aa-855e-cb8ab7235bc9 uri = /v1/projects/demo-project
209082025-03-07T23:12:38.507ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8153c882-f6d8-48aa-855e-cb8ab7235bc9 uri = /v1/projects/demo-project
209092025-03-07T23:12:38.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 257 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8153c882-f6d8-48aa-855e-cb8ab7235bc9 response_code = 401 uri = /v1/projects/demo-project
209102025-03-07T23:12:38.508ZINFOtest_unauthorized (external client test context): client received response status = 401
209112025-03-07T23:12:38.509ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects/demo-project
209122025-03-07T23:12:38.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project
209132025-03-07T23:12:38.510ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b7c5f81-4968-4f0c-93ad-8bf9cd3110f0 uri = /v1/projects/demo-project
209142025-03-07T23:12:38.510ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b7c5f81-4968-4f0c-93ad-8bf9cd3110f0 uri = /v1/projects/demo-project
209152025-03-07T23:12:38.526ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:940:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:954:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b7c5f81-4968-4f0c-93ad-8bf9cd3110f0 uri = /v1/projects/demo-project
209162025-03-07T23:12:38.526ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1026 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3b7c5f81-4968-4f0c-93ad-8bf9cd3110f0 response_code = 401 uri = /v1/projects/demo-project
209172025-03-07T23:12:38.526ZINFOtest_unauthorized (external client test context): client received response status = 401
209182025-03-07T23:12:38.526ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects/demo-project
209192025-03-07T23:12:38.526ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project
209202025-03-07T23:12:38.526ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35797acf-7b18-407e-8f59-bd614da0a000 uri = /v1/projects/demo-project
209212025-03-07T23:12:38.527ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35797acf-7b18-407e-8f59-bd614da0a000 response_code = 405 uri = /v1/projects/demo-project
209222025-03-07T23:12:38.527ZINFOtest_unauthorized (external client test context): client received response status = 405
209232025-03-07T23:12:38.527ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects/demo-project
209242025-03-07T23:12:38.528ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project
209252025-03-07T23:12:38.528ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d4b7ab9b-0bb2-43bf-98c6-da642aedff8a uri = /v1/projects/demo-project
209262025-03-07T23:12:38.528ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d4b7ab9b-0bb2-43bf-98c6-da642aedff8a response_code = 405 uri = /v1/projects/demo-project
209272025-03-07T23:12:38.528ZINFOtest_unauthorized (external client test context): client received response status = 405
209282025-03-07T23:12:38.529ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects/demo-project
209292025-03-07T23:12:38.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project
209302025-03-07T23:12:38.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb63d664-edc3-4ccf-87f0-b23668ae443a uri = /v1/projects/demo-project
209312025-03-07T23:12:38.529ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cb63d664-edc3-4ccf-87f0-b23668ae443a response_code = 405 uri = /v1/projects/demo-project
209322025-03-07T23:12:38.529ZINFOtest_unauthorized (external client test context): client received response status = 405
209332025-03-07T23:12:38.529ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects/demo-project
209342025-03-07T23:12:38.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project
209352025-03-07T23:12:38.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fecc184d-44e9-4c64-976c-518f4606b194 uri = /v1/projects/demo-project
209362025-03-07T23:12:38.529ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fecc184d-44e9-4c64-976c-518f4606b194 response_code = 405 uri = /v1/projects/demo-project
209372025-03-07T23:12:38.529ZINFOtest_unauthorized (external client test context): client received response status = 405
209382025-03-07T23:12:38.529ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects/demo-project
209392025-03-07T23:12:38.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project
209402025-03-07T23:12:38.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab uri = /v1/projects/demo-project
209412025-03-07T23:12:38.529ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab uri = /v1/projects/demo-project
209422025-03-07T23:12:38.530ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
209432025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209442025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209452025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209462025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209472025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209482025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209492025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
209502025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
209512025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209522025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209532025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209542025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
209552025-03-07T23:12:38.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209562025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209572025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209582025-03-07T23:12:38.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
209592025-03-07T23:12:38.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
209602025-03-07T23:12:38.531ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209612025-03-07T23:12:38.531ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209622025-03-07T23:12:38.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209632025-03-07T23:12:38.531ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
209642025-03-07T23:12:38.532ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
209652025-03-07T23:12:38.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209662025-03-07T23:12:38.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209672025-03-07T23:12:38.532ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209682025-03-07T23:12:38.534ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
209692025-03-07T23:12:38.534ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209702025-03-07T23:12:38.534ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209712025-03-07T23:12:38.535ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209722025-03-07T23:12:38.536ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
209732025-03-07T23:12:38.540ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
209742025-03-07T23:12:38.541ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab uri = /v1/projects/demo-project
209752025-03-07T23:12:38.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database uri = /v1/projects/demo-project
209762025-03-07T23:12:38.541ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209772025-03-07T23:12:38.541ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database result = Ok(()) uri = /v1/projects/demo-project
209782025-03-07T23:12:38.543ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database uri = /v1/projects/demo-project
209792025-03-07T23:12:38.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209802025-03-07T23:12:38.545ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database result = Ok(()) uri = /v1/projects/demo-project
209812025-03-07T23:12:38.547ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
209822025-03-07T23:12:38.548ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project
209832025-03-07T23:12:38.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database uri = /v1/projects/demo-project
209842025-03-07T23:12:38.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209852025-03-07T23:12:38.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database result = Ok(()) uri = /v1/projects/demo-project
209862025-03-07T23:12:38.551ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
209872025-03-07T23:12:38.551ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database uri = /v1/projects/demo-project
209882025-03-07T23:12:38.551ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209892025-03-07T23:12:38.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database result = Ok(()) uri = /v1/projects/demo-project
209902025-03-07T23:12:38.554ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
209912025-03-07T23:12:38.555ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database uri = /v1/projects/demo-project
209922025-03-07T23:12:38.555ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209932025-03-07T23:12:38.555ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Database result = Ok(()) uri = /v1/projects/demo-project
209942025-03-07T23:12:38.558ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209952025-03-07T23:12:38.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
209962025-03-07T23:12:38.575ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 69319 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 52d2bddc-a19f-4e85-b71b-dbb9b06673ab response_code = 404 uri = /v1/projects/demo-project
209972025-03-07T23:12:38.575ZINFOtest_unauthorized (external client test context): client received response status = 404
209982025-03-07T23:12:38.575ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects/demo-project
209992025-03-07T23:12:38.583ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project
210002025-03-07T23:12:38.583ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23c43202-9201-44d8-bed9-a20faf139c90 uri = /v1/projects/demo-project
210012025-03-07T23:12:38.584ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23c43202-9201-44d8-bed9-a20faf139c90 uri = /v1/projects/demo-project
210022025-03-07T23:12:38.584ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23c43202-9201-44d8-bed9-a20faf139c90 uri = /v1/projects/demo-project
210032025-03-07T23:12:38.585ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23c43202-9201-44d8-bed9-a20faf139c90 uri = /v1/projects/demo-project
210042025-03-07T23:12:38.585ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 556 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23c43202-9201-44d8-bed9-a20faf139c90 response_code = 401 uri = /v1/projects/demo-project
210052025-03-07T23:12:38.585ZINFOtest_unauthorized (external client test context): client received response status = 401
210062025-03-07T23:12:38.585ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects/demo-project
210072025-03-07T23:12:38.585ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project
210082025-03-07T23:12:38.585ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e2316bd3-87a6-44e1-83e8-bd9bdec0aaf4 uri = /v1/projects/demo-project
210092025-03-07T23:12:38.587ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e2316bd3-87a6-44e1-83e8-bd9bdec0aaf4 uri = /v1/projects/demo-project
210102025-03-07T23:12:38.587ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e2316bd3-87a6-44e1-83e8-bd9bdec0aaf4 uri = /v1/projects/demo-project
210112025-03-07T23:12:38.587ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 647 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e2316bd3-87a6-44e1-83e8-bd9bdec0aaf4 response_code = 401 uri = /v1/projects/demo-project
210122025-03-07T23:12:38.587ZINFOtest_unauthorized (external client test context): client received response status = 401
210132025-03-07T23:12:38.587ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects/demo-project
210142025-03-07T23:12:38.587ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project
210152025-03-07T23:12:38.587ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5da8e113-4631-4004-a568-febb2dd11c61 uri = /v1/projects/demo-project
210162025-03-07T23:12:38.588ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5da8e113-4631-4004-a568-febb2dd11c61 uri = /v1/projects/demo-project
210172025-03-07T23:12:38.588ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:909:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:921:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5da8e113-4631-4004-a568-febb2dd11c61 uri = /v1/projects/demo-project
210182025-03-07T23:12:38.588ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1959 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5da8e113-4631-4004-a568-febb2dd11c61 response_code = 401 uri = /v1/projects/demo-project
210192025-03-07T23:12:38.589ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210202025-03-07T23:12:38.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210212025-03-07T23:12:38.590ZINFOtest_unauthorized (external client test context): client received response status = 401
210222025-03-07T23:12:38.590ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects/demo-project
210232025-03-07T23:12:38.590ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project
210242025-03-07T23:12:38.592ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6f5cc055-cfe4-47c1-8b86-3330ae7af35f uri = /v1/projects/demo-project
210252025-03-07T23:12:38.592ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 264 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6f5cc055-cfe4-47c1-8b86-3330ae7af35f response_code = 405 uri = /v1/projects/demo-project
210262025-03-07T23:12:38.593ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210272025-03-07T23:12:38.593ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210282025-03-07T23:12:38.594ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210292025-03-07T23:12:38.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
210302025-03-07T23:12:38.595ZINFOtest_unauthorized (external client test context): client received response status = 405
210312025-03-07T23:12:38.595ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects/demo-project
210322025-03-07T23:12:38.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project
210332025-03-07T23:12:38.597ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c806d888-8bd9-4362-8535-4425f8e2b818 uri = /v1/projects/demo-project
210342025-03-07T23:12:38.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 2653 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c806d888-8bd9-4362-8535-4425f8e2b818 response_code = 405 uri = /v1/projects/demo-project
210352025-03-07T23:12:38.598ZINFOtest_unauthorized (external client test context): client received response status = 405
210362025-03-07T23:12:38.599ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects/demo-project
210372025-03-07T23:12:38.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project
210382025-03-07T23:12:38.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c2596341-cd4f-45ba-8ef4-a8f9bafe0714 uri = /v1/projects/demo-project
210392025-03-07T23:12:38.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c2596341-cd4f-45ba-8ef4-a8f9bafe0714 response_code = 405 uri = /v1/projects/demo-project
210402025-03-07T23:12:38.599ZINFOtest_unauthorized (external client test context): client received response status = 405
210412025-03-07T23:12:38.599ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects/demo-project
210422025-03-07T23:12:38.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project
210432025-03-07T23:12:38.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ebb764c1-4bf3-40bd-b72f-9e40cc3cce15 uri = /v1/projects/demo-project
210442025-03-07T23:12:38.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 126 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ebb764c1-4bf3-40bd-b72f-9e40cc3cce15 response_code = 405 uri = /v1/projects/demo-project
210452025-03-07T23:12:38.599ZINFOtest_unauthorized (external client test context): client received response status = 405
210462025-03-07T23:12:38.599ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects/demo-project
210472025-03-07T23:12:38.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project
210482025-03-07T23:12:38.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 uri = /v1/projects/demo-project
210492025-03-07T23:12:38.600ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 uri = /v1/projects/demo-project
210502025-03-07T23:12:38.601ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project
210512025-03-07T23:12:38.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210522025-03-07T23:12:38.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210532025-03-07T23:12:38.601ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210542025-03-07T23:12:38.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210552025-03-07T23:12:38.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210562025-03-07T23:12:38.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210572025-03-07T23:12:38.608ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
210582025-03-07T23:12:38.608ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
210592025-03-07T23:12:38.608ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210602025-03-07T23:12:38.608ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210612025-03-07T23:12:38.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210622025-03-07T23:12:38.614ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
210632025-03-07T23:12:38.615ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210642025-03-07T23:12:38.615ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210652025-03-07T23:12:38.615ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210662025-03-07T23:12:38.618ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
210672025-03-07T23:12:38.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
210682025-03-07T23:12:38.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210692025-03-07T23:12:38.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210702025-03-07T23:12:38.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210712025-03-07T23:12:38.627ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
210722025-03-07T23:12:38.628ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
210732025-03-07T23:12:38.628ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210742025-03-07T23:12:38.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210752025-03-07T23:12:38.630ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210762025-03-07T23:12:38.631ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
210772025-03-07T23:12:38.632ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210782025-03-07T23:12:38.632ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210792025-03-07T23:12:38.632ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210802025-03-07T23:12:38.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
210812025-03-07T23:12:38.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
210822025-03-07T23:12:38.647ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 uri = /v1/projects/demo-project
210832025-03-07T23:12:38.647ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database uri = /v1/projects/demo-project
210842025-03-07T23:12:38.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210852025-03-07T23:12:38.647ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database result = Ok(()) uri = /v1/projects/demo-project
210862025-03-07T23:12:38.647ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database uri = /v1/projects/demo-project
210872025-03-07T23:12:38.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210882025-03-07T23:12:38.648ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database result = Ok(()) uri = /v1/projects/demo-project
210892025-03-07T23:12:38.651ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
210902025-03-07T23:12:38.652ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project
210912025-03-07T23:12:38.652ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database uri = /v1/projects/demo-project
210922025-03-07T23:12:38.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210932025-03-07T23:12:38.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database result = Ok(()) uri = /v1/projects/demo-project
210942025-03-07T23:12:38.657ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
210952025-03-07T23:12:38.657ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database uri = /v1/projects/demo-project
210962025-03-07T23:12:38.657ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210972025-03-07T23:12:38.658ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database result = Ok(()) uri = /v1/projects/demo-project
210982025-03-07T23:12:38.662ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
210992025-03-07T23:12:38.662ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database uri = /v1/projects/demo-project
211002025-03-07T23:12:38.663ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211012025-03-07T23:12:38.663ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Database result = Ok(()) uri = /v1/projects/demo-project
211022025-03-07T23:12:38.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project
211032025-03-07T23:12:38.674ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project
211042025-03-07T23:12:38.674ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 74734 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d4c07262-7638-4dae-bc4b-6add21d81735 response_code = 200 uri = /v1/projects/demo-project
211052025-03-07T23:12:38.674ZINFOtest_unauthorized (external client test context): client received response status = 200
211062025-03-07T23:12:38.675ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects/demo-project/policy
211072025-03-07T23:12:38.676ZINFOtest_unauthorized: test: privileged GET url = /v1/projects/demo-project/policy
211082025-03-07T23:12:38.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
211092025-03-07T23:12:38.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb uri = /v1/projects/demo-project/policy
211102025-03-07T23:12:38.676ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb uri = /v1/projects/demo-project/policy
211112025-03-07T23:12:38.676ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project/policy
211122025-03-07T23:12:38.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211132025-03-07T23:12:38.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211142025-03-07T23:12:38.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211152025-03-07T23:12:38.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211162025-03-07T23:12:38.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211172025-03-07T23:12:38.679ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211182025-03-07T23:12:38.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
211192025-03-07T23:12:38.682ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
211202025-03-07T23:12:38.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211212025-03-07T23:12:38.682ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211222025-03-07T23:12:38.684ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211232025-03-07T23:12:38.687ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
211242025-03-07T23:12:38.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211252025-03-07T23:12:38.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211262025-03-07T23:12:38.689ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211272025-03-07T23:12:38.691ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
211282025-03-07T23:12:38.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
211292025-03-07T23:12:38.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211302025-03-07T23:12:38.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211312025-03-07T23:12:38.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211322025-03-07T23:12:38.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
211332025-03-07T23:12:38.700ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
211342025-03-07T23:12:38.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211352025-03-07T23:12:38.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211362025-03-07T23:12:38.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211372025-03-07T23:12:38.701ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
211382025-03-07T23:12:38.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211392025-03-07T23:12:38.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211402025-03-07T23:12:38.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211412025-03-07T23:12:38.721ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
211422025-03-07T23:12:38.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
211432025-03-07T23:12:38.725ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb uri = /v1/projects/demo-project/policy
211442025-03-07T23:12:38.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211452025-03-07T23:12:38.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211462025-03-07T23:12:38.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211472025-03-07T23:12:38.735ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211482025-03-07T23:12:38.735ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211492025-03-07T23:12:38.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211502025-03-07T23:12:38.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
211512025-03-07T23:12:38.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
211522025-03-07T23:12:38.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211532025-03-07T23:12:38.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211542025-03-07T23:12:38.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211552025-03-07T23:12:38.742ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
211562025-03-07T23:12:38.742ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211572025-03-07T23:12:38.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211582025-03-07T23:12:38.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211592025-03-07T23:12:38.746ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
211602025-03-07T23:12:38.746ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211612025-03-07T23:12:38.746ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211622025-03-07T23:12:38.748ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211632025-03-07T23:12:38.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
211642025-03-07T23:12:38.781ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
211652025-03-07T23:12:38.781ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211662025-03-07T23:12:38.781ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211672025-03-07T23:12:38.782ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211682025-03-07T23:12:38.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
211692025-03-07T23:12:38.797ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
211702025-03-07T23:12:38.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211712025-03-07T23:12:38.797ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211722025-03-07T23:12:38.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211732025-03-07T23:12:38.808ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
211742025-03-07T23:12:38.813ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211752025-03-07T23:12:38.813ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211762025-03-07T23:12:38.817ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211772025-03-07T23:12:38.852ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
211782025-03-07T23:12:38.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database uri = /v1/projects/demo-project/policy
211792025-03-07T23:12:38.853ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
211802025-03-07T23:12:38.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
211812025-03-07T23:12:38.866ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
211822025-03-07T23:12:38.883ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
211832025-03-07T23:12:38.886ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 210931 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f7f35512-4910-4048-af17-f69c87b6caeb response_code = 200 uri = /v1/projects/demo-project/policy
211842025-03-07T23:12:38.893ZINFOtest_unauthorized (external client test context): client received response status = 200
211852025-03-07T23:12:38.898ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects/demo-project/policy
211862025-03-07T23:12:38.915ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
211872025-03-07T23:12:38.916ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b uri = /v1/projects/demo-project/policy
211882025-03-07T23:12:38.916ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b uri = /v1/projects/demo-project/policy
211892025-03-07T23:12:38.916ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project/policy
211902025-03-07T23:12:38.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211912025-03-07T23:12:38.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211922025-03-07T23:12:38.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211932025-03-07T23:12:38.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211942025-03-07T23:12:38.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211952025-03-07T23:12:38.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211962025-03-07T23:12:38.924ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
211972025-03-07T23:12:38.924ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
211982025-03-07T23:12:38.924ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211992025-03-07T23:12:38.924ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212002025-03-07T23:12:38.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212012025-03-07T23:12:38.929ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212022025-03-07T23:12:38.931ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212032025-03-07T23:12:38.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212042025-03-07T23:12:38.931ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212052025-03-07T23:12:38.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
212062025-03-07T23:12:38.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
212072025-03-07T23:12:38.938ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212082025-03-07T23:12:38.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212092025-03-07T23:12:38.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212102025-03-07T23:12:38.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
212112025-03-07T23:12:38.964ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
212122025-03-07T23:12:38.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212132025-03-07T23:12:38.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212142025-03-07T23:12:38.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212152025-03-07T23:12:38.965ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212162025-03-07T23:12:38.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212172025-03-07T23:12:38.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212182025-03-07T23:12:38.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212192025-03-07T23:12:38.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
212202025-03-07T23:12:38.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
212212025-03-07T23:12:38.979ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b uri = /v1/projects/demo-project/policy
212222025-03-07T23:12:38.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database uri = /v1/projects/demo-project/policy
212232025-03-07T23:12:38.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212242025-03-07T23:12:38.980ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
212252025-03-07T23:12:38.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database uri = /v1/projects/demo-project/policy
212262025-03-07T23:12:38.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212272025-03-07T23:12:38.980ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
212282025-03-07T23:12:38.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
212292025-03-07T23:12:38.980ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
212302025-03-07T23:12:38.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database uri = /v1/projects/demo-project/policy
212312025-03-07T23:12:38.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212322025-03-07T23:12:38.983ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
212332025-03-07T23:12:38.983ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
212342025-03-07T23:12:38.984ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database uri = /v1/projects/demo-project/policy
212352025-03-07T23:12:38.984ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212362025-03-07T23:12:38.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
212372025-03-07T23:12:38.984ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
212382025-03-07T23:12:38.984ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database uri = /v1/projects/demo-project/policy
212392025-03-07T23:12:38.984ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212402025-03-07T23:12:38.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
212412025-03-07T23:12:38.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
212422025-03-07T23:12:39.018ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project/policy
212432025-03-07T23:12:39.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 119563 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a1dd96c-5f76-44de-9145-33160bcda51b response_code = 404 uri = /v1/projects/demo-project/policy
212442025-03-07T23:12:39.019ZINFOtest_unauthorized (external client test context): client received response status = 404
212452025-03-07T23:12:39.019ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects/demo-project/policy
212462025-03-07T23:12:39.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
212472025-03-07T23:12:39.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 761ac62b-7154-411c-8924-88068d3f2df7 uri = /v1/projects/demo-project/policy
212482025-03-07T23:12:39.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 761ac62b-7154-411c-8924-88068d3f2df7 uri = /v1/projects/demo-project/policy
212492025-03-07T23:12:39.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 761ac62b-7154-411c-8924-88068d3f2df7 uri = /v1/projects/demo-project/policy
212502025-03-07T23:12:39.020ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 761ac62b-7154-411c-8924-88068d3f2df7 uri = /v1/projects/demo-project/policy
212512025-03-07T23:12:39.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 486 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 761ac62b-7154-411c-8924-88068d3f2df7 response_code = 401 uri = /v1/projects/demo-project/policy
212522025-03-07T23:12:39.021ZINFOtest_unauthorized (external client test context): client received response status = 401
212532025-03-07T23:12:39.022ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects/demo-project/policy
212542025-03-07T23:12:39.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
212552025-03-07T23:12:39.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 111e6b07-0287-4fc9-9fda-cd966c61b805 uri = /v1/projects/demo-project/policy
212562025-03-07T23:12:39.022ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 111e6b07-0287-4fc9-9fda-cd966c61b805 uri = /v1/projects/demo-project/policy
212572025-03-07T23:12:39.022ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 111e6b07-0287-4fc9-9fda-cd966c61b805 uri = /v1/projects/demo-project/policy
212582025-03-07T23:12:39.022ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 198 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 111e6b07-0287-4fc9-9fda-cd966c61b805 response_code = 401 uri = /v1/projects/demo-project/policy
212592025-03-07T23:12:39.022ZINFOtest_unauthorized (external client test context): client received response status = 401
212602025-03-07T23:12:39.022ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects/demo-project/policy
212612025-03-07T23:12:39.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
212622025-03-07T23:12:39.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b5418e7e-cf62-4ec9-a592-ee336c80684f uri = /v1/projects/demo-project/policy
212632025-03-07T23:12:39.023ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b5418e7e-cf62-4ec9-a592-ee336c80684f uri = /v1/projects/demo-project/policy
212642025-03-07T23:12:39.023ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:967:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:980:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b5418e7e-cf62-4ec9-a592-ee336c80684f uri = /v1/projects/demo-project/policy
212652025-03-07T23:12:39.023ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 860 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b5418e7e-cf62-4ec9-a592-ee336c80684f response_code = 401 uri = /v1/projects/demo-project/policy
212662025-03-07T23:12:39.023ZINFOtest_unauthorized (external client test context): client received response status = 401
212672025-03-07T23:12:39.023ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects/demo-project/policy
212682025-03-07T23:12:39.023ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
212692025-03-07T23:12:39.023ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f uri = /v1/projects/demo-project/policy
212702025-03-07T23:12:39.023ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f uri = /v1/projects/demo-project/policy
212712025-03-07T23:12:39.023ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project/policy
212722025-03-07T23:12:39.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212732025-03-07T23:12:39.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212742025-03-07T23:12:39.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212752025-03-07T23:12:39.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212762025-03-07T23:12:39.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212772025-03-07T23:12:39.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212782025-03-07T23:12:39.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
212792025-03-07T23:12:39.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
212802025-03-07T23:12:39.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212812025-03-07T23:12:39.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212822025-03-07T23:12:39.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212832025-03-07T23:12:39.033ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212842025-03-07T23:12:39.033ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212852025-03-07T23:12:39.033ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212862025-03-07T23:12:39.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212872025-03-07T23:12:39.036ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
212882025-03-07T23:12:39.039ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
212892025-03-07T23:12:39.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212902025-03-07T23:12:39.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212912025-03-07T23:12:39.040ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212922025-03-07T23:12:39.043ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
212932025-03-07T23:12:39.044ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
212942025-03-07T23:12:39.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212952025-03-07T23:12:39.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212962025-03-07T23:12:39.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212972025-03-07T23:12:39.047ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212982025-03-07T23:12:39.047ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212992025-03-07T23:12:39.048ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213002025-03-07T23:12:39.048ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213012025-03-07T23:12:39.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
213022025-03-07T23:12:39.060ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
213032025-03-07T23:12:39.061ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f uri = /v1/projects/demo-project/policy
213042025-03-07T23:12:39.061ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database uri = /v1/projects/demo-project/policy
213052025-03-07T23:12:39.061ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213062025-03-07T23:12:39.062ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213072025-03-07T23:12:39.064ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database uri = /v1/projects/demo-project/policy
213082025-03-07T23:12:39.065ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213092025-03-07T23:12:39.065ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213102025-03-07T23:12:39.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
213112025-03-07T23:12:39.067ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
213122025-03-07T23:12:39.067ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database uri = /v1/projects/demo-project/policy
213132025-03-07T23:12:39.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213142025-03-07T23:12:39.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213152025-03-07T23:12:39.070ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
213162025-03-07T23:12:39.071ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database uri = /v1/projects/demo-project/policy
213172025-03-07T23:12:39.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213182025-03-07T23:12:39.071ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213192025-03-07T23:12:39.074ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
213202025-03-07T23:12:39.074ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database uri = /v1/projects/demo-project/policy
213212025-03-07T23:12:39.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213222025-03-07T23:12:39.075ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213232025-03-07T23:12:39.091ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213242025-03-07T23:12:39.102ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project/policy
213252025-03-07T23:12:39.103ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 79618 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ba3bfc81-d129-42dd-804b-314506068b2f response_code = 404 uri = /v1/projects/demo-project/policy
213262025-03-07T23:12:39.103ZINFOtest_unauthorized (external client test context): client received response status = 404
213272025-03-07T23:12:39.104ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects/demo-project/policy
213282025-03-07T23:12:39.104ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213292025-03-07T23:12:39.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d01aba-31ce-4acc-b7fb-7ecd73095446 uri = /v1/projects/demo-project/policy
213302025-03-07T23:12:39.104ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d01aba-31ce-4acc-b7fb-7ecd73095446 uri = /v1/projects/demo-project/policy
213312025-03-07T23:12:39.105ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d01aba-31ce-4acc-b7fb-7ecd73095446 uri = /v1/projects/demo-project/policy
213322025-03-07T23:12:39.105ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d01aba-31ce-4acc-b7fb-7ecd73095446 uri = /v1/projects/demo-project/policy
213332025-03-07T23:12:39.105ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 384 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d01aba-31ce-4acc-b7fb-7ecd73095446 response_code = 401 uri = /v1/projects/demo-project/policy
213342025-03-07T23:12:39.105ZINFOtest_unauthorized (external client test context): client received response status = 401
213352025-03-07T23:12:39.105ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects/demo-project/policy
213362025-03-07T23:12:39.105ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213372025-03-07T23:12:39.105ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d8b96e4d-1f8c-42f5-9877-ea7305a41e62 uri = /v1/projects/demo-project/policy
213382025-03-07T23:12:39.105ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d8b96e4d-1f8c-42f5-9877-ea7305a41e62 uri = /v1/projects/demo-project/policy
213392025-03-07T23:12:39.109ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d8b96e4d-1f8c-42f5-9877-ea7305a41e62 uri = /v1/projects/demo-project/policy
213402025-03-07T23:12:39.109ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 234 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d8b96e4d-1f8c-42f5-9877-ea7305a41e62 response_code = 401 uri = /v1/projects/demo-project/policy
213412025-03-07T23:12:39.109ZINFOtest_unauthorized (external client test context): client received response status = 401
213422025-03-07T23:12:39.109ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects/demo-project/policy
213432025-03-07T23:12:39.109ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213442025-03-07T23:12:39.109ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30a07426-0053-4e64-af76-e0172cf00186 uri = /v1/projects/demo-project/policy
213452025-03-07T23:12:39.109ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30a07426-0053-4e64-af76-e0172cf00186 uri = /v1/projects/demo-project/policy
213462025-03-07T23:12:39.110ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:995:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1009:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30a07426-0053-4e64-af76-e0172cf00186 uri = /v1/projects/demo-project/policy
213472025-03-07T23:12:39.110ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 916 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 30a07426-0053-4e64-af76-e0172cf00186 response_code = 401 uri = /v1/projects/demo-project/policy
213482025-03-07T23:12:39.110ZINFOtest_unauthorized (external client test context): client received response status = 401
213492025-03-07T23:12:39.110ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects/demo-project/policy
213502025-03-07T23:12:39.110ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213512025-03-07T23:12:39.110ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 92858eb7-c279-4427-996a-707c42d38ed9 uri = /v1/projects/demo-project/policy
213522025-03-07T23:12:39.110ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 92858eb7-c279-4427-996a-707c42d38ed9 response_code = 405 uri = /v1/projects/demo-project/policy
213532025-03-07T23:12:39.110ZINFOtest_unauthorized (external client test context): client received response status = 405
213542025-03-07T23:12:39.110ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects/demo-project/policy
213552025-03-07T23:12:39.110ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213562025-03-07T23:12:39.110ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e6e6ec5c-2535-4783-a2e5-8d7ab507ed1b uri = /v1/projects/demo-project/policy
213572025-03-07T23:12:39.110ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e6e6ec5c-2535-4783-a2e5-8d7ab507ed1b response_code = 405 uri = /v1/projects/demo-project/policy
213582025-03-07T23:12:39.110ZINFOtest_unauthorized (external client test context): client received response status = 405
213592025-03-07T23:12:39.110ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects/demo-project/policy
213602025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213612025-03-07T23:12:39.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 552fe235-4969-4622-8d13-f03a9879f6cc uri = /v1/projects/demo-project/policy
213622025-03-07T23:12:39.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 552fe235-4969-4622-8d13-f03a9879f6cc response_code = 405 uri = /v1/projects/demo-project/policy
213632025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client received response status = 405
213642025-03-07T23:12:39.112ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects/demo-project/policy
213652025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213662025-03-07T23:12:39.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96870acd-c798-40ac-a4ac-a317ed8df9bb uri = /v1/projects/demo-project/policy
213672025-03-07T23:12:39.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96870acd-c798-40ac-a4ac-a317ed8df9bb response_code = 405 uri = /v1/projects/demo-project/policy
213682025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client received response status = 405
213692025-03-07T23:12:39.112ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects/demo-project/policy
213702025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213712025-03-07T23:12:39.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7929425f-9472-4e93-be64-a531037ee34e uri = /v1/projects/demo-project/policy
213722025-03-07T23:12:39.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7929425f-9472-4e93-be64-a531037ee34e response_code = 405 uri = /v1/projects/demo-project/policy
213732025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client received response status = 405
213742025-03-07T23:12:39.112ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects/demo-project/policy
213752025-03-07T23:12:39.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213762025-03-07T23:12:39.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5422248e-6a2d-4783-92fc-babc4817eb7e uri = /v1/projects/demo-project/policy
213772025-03-07T23:12:39.114ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5422248e-6a2d-4783-92fc-babc4817eb7e response_code = 405 uri = /v1/projects/demo-project/policy
213782025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client received response status = 405
213792025-03-07T23:12:39.114ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects/demo-project/policy
213802025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213812025-03-07T23:12:39.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 10cebbd2-516c-4963-b4c8-5b2204e21812 uri = /v1/projects/demo-project/policy
213822025-03-07T23:12:39.114ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 10cebbd2-516c-4963-b4c8-5b2204e21812 response_code = 405 uri = /v1/projects/demo-project/policy
213832025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client received response status = 405
213842025-03-07T23:12:39.114ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects/demo-project/policy
213852025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213862025-03-07T23:12:39.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3337a021-ff45-4a75-9920-a7a0f4afe806 uri = /v1/projects/demo-project/policy
213872025-03-07T23:12:39.114ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3337a021-ff45-4a75-9920-a7a0f4afe806 response_code = 405 uri = /v1/projects/demo-project/policy
213882025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client received response status = 405
213892025-03-07T23:12:39.114ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects/demo-project/policy
213902025-03-07T23:12:39.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213912025-03-07T23:12:39.115ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8bec67d2-62c6-49e5-aef4-3d40bca57e70 uri = /v1/projects/demo-project/policy
213922025-03-07T23:12:39.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8bec67d2-62c6-49e5-aef4-3d40bca57e70 response_code = 405 uri = /v1/projects/demo-project/policy
213932025-03-07T23:12:39.116ZINFOtest_unauthorized (external client test context): client received response status = 405
213942025-03-07T23:12:39.116ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects/demo-project/policy
213952025-03-07T23:12:39.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
213962025-03-07T23:12:39.116ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bceea748-c499-443d-8d83-a2324338c9ba uri = /v1/projects/demo-project/policy
213972025-03-07T23:12:39.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bceea748-c499-443d-8d83-a2324338c9ba response_code = 405 uri = /v1/projects/demo-project/policy
213982025-03-07T23:12:39.116ZINFOtest_unauthorized (external client test context): client received response status = 405
213992025-03-07T23:12:39.116ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects/demo-project/policy
214002025-03-07T23:12:39.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
214012025-03-07T23:12:39.116ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3b9fa55f-e128-48dd-9ead-b50414b5abc4 uri = /v1/projects/demo-project/policy
214022025-03-07T23:12:39.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3b9fa55f-e128-48dd-9ead-b50414b5abc4 response_code = 405 uri = /v1/projects/demo-project/policy
214032025-03-07T23:12:39.116ZINFOtest_unauthorized (external client test context): client received response status = 405
214042025-03-07T23:12:39.116ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects/demo-project/policy
214052025-03-07T23:12:39.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
214062025-03-07T23:12:39.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c732c57-c1c7-45c7-aa6e-56a1ff729515 uri = /v1/projects/demo-project/policy
214072025-03-07T23:12:39.118ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c732c57-c1c7-45c7-aa6e-56a1ff729515 response_code = 405 uri = /v1/projects/demo-project/policy
214082025-03-07T23:12:39.118ZINFOtest_unauthorized (external client test context): client received response status = 405
214092025-03-07T23:12:39.118ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects/demo-project/policy
214102025-03-07T23:12:39.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/projects/demo-project/policy
214112025-03-07T23:12:39.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 uri = /v1/projects/demo-project/policy
214122025-03-07T23:12:39.118ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 uri = /v1/projects/demo-project/policy
214132025-03-07T23:12:39.118ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project/policy
214142025-03-07T23:12:39.118ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214152025-03-07T23:12:39.118ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214162025-03-07T23:12:39.118ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214172025-03-07T23:12:39.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214182025-03-07T23:12:39.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214192025-03-07T23:12:39.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214202025-03-07T23:12:39.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
214212025-03-07T23:12:39.120ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
214222025-03-07T23:12:39.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214232025-03-07T23:12:39.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214242025-03-07T23:12:39.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214252025-03-07T23:12:39.123ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
214262025-03-07T23:12:39.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214272025-03-07T23:12:39.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214282025-03-07T23:12:39.124ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214292025-03-07T23:12:39.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
214302025-03-07T23:12:39.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
214312025-03-07T23:12:39.132ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214322025-03-07T23:12:39.132ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214332025-03-07T23:12:39.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214342025-03-07T23:12:39.132ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
214352025-03-07T23:12:39.132ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
214362025-03-07T23:12:39.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214372025-03-07T23:12:39.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214382025-03-07T23:12:39.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214392025-03-07T23:12:39.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
214402025-03-07T23:12:39.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214412025-03-07T23:12:39.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214422025-03-07T23:12:39.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214432025-03-07T23:12:39.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
214442025-03-07T23:12:39.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
214452025-03-07T23:12:39.142ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 uri = /v1/projects/demo-project/policy
214462025-03-07T23:12:39.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214472025-03-07T23:12:39.142ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214482025-03-07T23:12:39.143ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214492025-03-07T23:12:39.144ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214502025-03-07T23:12:39.144ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214512025-03-07T23:12:39.145ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214522025-03-07T23:12:39.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
214532025-03-07T23:12:39.147ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
214542025-03-07T23:12:39.147ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214552025-03-07T23:12:39.147ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214562025-03-07T23:12:39.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214572025-03-07T23:12:39.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
214582025-03-07T23:12:39.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214592025-03-07T23:12:39.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214602025-03-07T23:12:39.150ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214612025-03-07T23:12:39.153ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
214622025-03-07T23:12:39.154ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214632025-03-07T23:12:39.154ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214642025-03-07T23:12:39.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214652025-03-07T23:12:39.158ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
214662025-03-07T23:12:39.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
214672025-03-07T23:12:39.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214682025-03-07T23:12:39.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214692025-03-07T23:12:39.166ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214702025-03-07T23:12:39.167ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
214712025-03-07T23:12:39.168ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/projects/demo-project/policy
214722025-03-07T23:12:39.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214732025-03-07T23:12:39.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214742025-03-07T23:12:39.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214752025-03-07T23:12:39.171ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
214762025-03-07T23:12:39.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214772025-03-07T23:12:39.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214782025-03-07T23:12:39.172ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214792025-03-07T23:12:39.174ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
214802025-03-07T23:12:39.174ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database uri = /v1/projects/demo-project/policy
214812025-03-07T23:12:39.174ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214822025-03-07T23:12:39.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214832025-03-07T23:12:39.178ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
214842025-03-07T23:12:39.184ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
214852025-03-07T23:12:39.185ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 71238 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4138009b-a0ab-431a-a67e-da12e85690e7 response_code = 200 uri = /v1/projects/demo-project/policy
214862025-03-07T23:12:39.186ZINFOtest_unauthorized (external client test context): client received response status = 200
214872025-03-07T23:12:39.187ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpcs?project=demo-project
214882025-03-07T23:12:39.187ZINFOtest_unauthorized: test: privileged GET url = /v1/vpcs?project=demo-project
214892025-03-07T23:12:39.187ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
214902025-03-07T23:12:39.187ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 uri = /v1/vpcs?project=demo-project
214912025-03-07T23:12:39.187ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 uri = /v1/vpcs?project=demo-project
214922025-03-07T23:12:39.188ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
214932025-03-07T23:12:39.188ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214942025-03-07T23:12:39.188ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214952025-03-07T23:12:39.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214962025-03-07T23:12:39.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214972025-03-07T23:12:39.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214982025-03-07T23:12:39.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214992025-03-07T23:12:39.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
215002025-03-07T23:12:39.194ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
215012025-03-07T23:12:39.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215022025-03-07T23:12:39.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215032025-03-07T23:12:39.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215042025-03-07T23:12:39.197ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
215052025-03-07T23:12:39.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215062025-03-07T23:12:39.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215072025-03-07T23:12:39.198ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215082025-03-07T23:12:39.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
215092025-03-07T23:12:39.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
215102025-03-07T23:12:39.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215112025-03-07T23:12:39.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215122025-03-07T23:12:39.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215132025-03-07T23:12:39.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
215142025-03-07T23:12:39.206ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
215152025-03-07T23:12:39.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215162025-03-07T23:12:39.206ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215172025-03-07T23:12:39.208ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215182025-03-07T23:12:39.210ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
215192025-03-07T23:12:39.210ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215202025-03-07T23:12:39.210ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215212025-03-07T23:12:39.211ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215222025-03-07T23:12:39.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
215232025-03-07T23:12:39.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
215242025-03-07T23:12:39.216ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 uri = /v1/vpcs?project=demo-project
215252025-03-07T23:12:39.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215262025-03-07T23:12:39.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215272025-03-07T23:12:39.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215282025-03-07T23:12:39.227ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215292025-03-07T23:12:39.227ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215302025-03-07T23:12:39.227ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
215312025-03-07T23:12:39.227ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
215322025-03-07T23:12:39.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215332025-03-07T23:12:39.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215342025-03-07T23:12:39.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215352025-03-07T23:12:39.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
215362025-03-07T23:12:39.238ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
215372025-03-07T23:12:39.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215382025-03-07T23:12:39.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215392025-03-07T23:12:39.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215402025-03-07T23:12:39.238ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
215412025-03-07T23:12:39.238ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
215422025-03-07T23:12:39.238ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
215432025-03-07T23:12:39.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215442025-03-07T23:12:39.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215452025-03-07T23:12:39.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215462025-03-07T23:12:39.251ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
215472025-03-07T23:12:39.251ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215482025-03-07T23:12:39.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215492025-03-07T23:12:39.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215502025-03-07T23:12:39.264ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
215512025-03-07T23:12:39.264ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215522025-03-07T23:12:39.264ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
215532025-03-07T23:12:39.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
215542025-03-07T23:12:39.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
215552025-03-07T23:12:39.274ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
215562025-03-07T23:12:39.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215572025-03-07T23:12:39.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215582025-03-07T23:12:39.276ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215592025-03-07T23:12:39.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
215602025-03-07T23:12:39.280ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215612025-03-07T23:12:39.280ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215622025-03-07T23:12:39.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215632025-03-07T23:12:39.283ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
215642025-03-07T23:12:39.284ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215652025-03-07T23:12:39.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215662025-03-07T23:12:39.284ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215672025-03-07T23:12:39.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
215682025-03-07T23:12:39.297ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
215692025-03-07T23:12:39.299ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database uri = /v1/vpcs?project=demo-project
215702025-03-07T23:12:39.299ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
215712025-03-07T23:12:39.299ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
215722025-03-07T23:12:39.303ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 116140 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 60930dab-231c-4787-a1fe-476cac68f975 response_code = 200 uri = /v1/vpcs?project=demo-project
215732025-03-07T23:12:39.303ZINFOtest_unauthorized (external client test context): client received response status = 200
215742025-03-07T23:12:39.304ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpcs?project=demo-project
215752025-03-07T23:12:39.305ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
215762025-03-07T23:12:39.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 uri = /v1/vpcs?project=demo-project
215772025-03-07T23:12:39.305ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 uri = /v1/vpcs?project=demo-project
215782025-03-07T23:12:39.305ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs?project=demo-project
215792025-03-07T23:12:39.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215802025-03-07T23:12:39.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215812025-03-07T23:12:39.305ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215822025-03-07T23:12:39.307ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215832025-03-07T23:12:39.307ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215842025-03-07T23:12:39.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215852025-03-07T23:12:39.310ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
215862025-03-07T23:12:39.310ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
215872025-03-07T23:12:39.310ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215882025-03-07T23:12:39.311ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215892025-03-07T23:12:39.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215902025-03-07T23:12:39.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
215912025-03-07T23:12:39.313ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215922025-03-07T23:12:39.313ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215932025-03-07T23:12:39.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215942025-03-07T23:12:39.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
215952025-03-07T23:12:39.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
215962025-03-07T23:12:39.320ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215972025-03-07T23:12:39.320ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215982025-03-07T23:12:39.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215992025-03-07T23:12:39.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
216002025-03-07T23:12:39.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
216012025-03-07T23:12:39.324ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
216022025-03-07T23:12:39.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216032025-03-07T23:12:39.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216042025-03-07T23:12:39.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216052025-03-07T23:12:39.327ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
216062025-03-07T23:12:39.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216072025-03-07T23:12:39.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216082025-03-07T23:12:39.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216092025-03-07T23:12:39.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
216102025-03-07T23:12:39.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
216112025-03-07T23:12:39.334ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 uri = /v1/vpcs?project=demo-project
216122025-03-07T23:12:39.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database uri = /v1/vpcs?project=demo-project
216132025-03-07T23:12:39.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216142025-03-07T23:12:39.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
216152025-03-07T23:12:39.337ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database uri = /v1/vpcs?project=demo-project
216162025-03-07T23:12:39.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216172025-03-07T23:12:39.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
216182025-03-07T23:12:39.340ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
216192025-03-07T23:12:39.340ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
216202025-03-07T23:12:39.340ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database uri = /v1/vpcs?project=demo-project
216212025-03-07T23:12:39.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216222025-03-07T23:12:39.341ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
216232025-03-07T23:12:39.345ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
216242025-03-07T23:12:39.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database uri = /v1/vpcs?project=demo-project
216252025-03-07T23:12:39.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216262025-03-07T23:12:39.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
216272025-03-07T23:12:39.362ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
216282025-03-07T23:12:39.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database uri = /v1/vpcs?project=demo-project
216292025-03-07T23:12:39.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216302025-03-07T23:12:39.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
216312025-03-07T23:12:39.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
216322025-03-07T23:12:39.373ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/vpcs?project=demo-project
216332025-03-07T23:12:39.374ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 69614 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ee9b0437-7eaf-4932-b00b-3b50d15043f6 response_code = 404 uri = /v1/vpcs?project=demo-project
216342025-03-07T23:12:39.374ZINFOtest_unauthorized (external client test context): client received response status = 404
216352025-03-07T23:12:39.375ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpcs?project=demo-project
216362025-03-07T23:12:39.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216372025-03-07T23:12:39.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ebd4f4d5-e3c4-4706-a55e-c47325d4ba67 uri = /v1/vpcs?project=demo-project
216382025-03-07T23:12:39.376ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ebd4f4d5-e3c4-4706-a55e-c47325d4ba67 uri = /v1/vpcs?project=demo-project
216392025-03-07T23:12:39.376ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ebd4f4d5-e3c4-4706-a55e-c47325d4ba67 uri = /v1/vpcs?project=demo-project
216402025-03-07T23:12:39.376ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ebd4f4d5-e3c4-4706-a55e-c47325d4ba67 uri = /v1/vpcs?project=demo-project
216412025-03-07T23:12:39.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 869 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ebd4f4d5-e3c4-4706-a55e-c47325d4ba67 response_code = 401 uri = /v1/vpcs?project=demo-project
216422025-03-07T23:12:39.376ZINFOtest_unauthorized (external client test context): client received response status = 401
216432025-03-07T23:12:39.377ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpcs?project=demo-project
216442025-03-07T23:12:39.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216452025-03-07T23:12:39.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70a6e659-289c-4298-98fc-9d948c2d9a6d uri = /v1/vpcs?project=demo-project
216462025-03-07T23:12:39.377ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70a6e659-289c-4298-98fc-9d948c2d9a6d uri = /v1/vpcs?project=demo-project
216472025-03-07T23:12:39.377ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70a6e659-289c-4298-98fc-9d948c2d9a6d uri = /v1/vpcs?project=demo-project
216482025-03-07T23:12:39.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 243 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70a6e659-289c-4298-98fc-9d948c2d9a6d response_code = 401 uri = /v1/vpcs?project=demo-project
216492025-03-07T23:12:39.377ZINFOtest_unauthorized (external client test context): client received response status = 401
216502025-03-07T23:12:39.378ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpcs?project=demo-project
216512025-03-07T23:12:39.378ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216522025-03-07T23:12:39.378ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3de75ba6-3d55-4d1e-887f-52d7f63f9cb7 uri = /v1/vpcs?project=demo-project
216532025-03-07T23:12:39.378ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3de75ba6-3d55-4d1e-887f-52d7f63f9cb7 uri = /v1/vpcs?project=demo-project
216542025-03-07T23:12:39.379ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4910:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4930:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3de75ba6-3d55-4d1e-887f-52d7f63f9cb7 uri = /v1/vpcs?project=demo-project
216552025-03-07T23:12:39.379ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1563 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3de75ba6-3d55-4d1e-887f-52d7f63f9cb7 response_code = 401 uri = /v1/vpcs?project=demo-project
216562025-03-07T23:12:39.380ZINFOtest_unauthorized (external client test context): client received response status = 401
216572025-03-07T23:12:39.380ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpcs?project=demo-project
216582025-03-07T23:12:39.380ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216592025-03-07T23:12:39.380ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1370a513-e156-49e3-bff7-c99cd342908f uri = /v1/vpcs?project=demo-project
216602025-03-07T23:12:39.380ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 183 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1370a513-e156-49e3-bff7-c99cd342908f response_code = 405 uri = /v1/vpcs?project=demo-project
216612025-03-07T23:12:39.381ZINFOtest_unauthorized (external client test context): client received response status = 405
216622025-03-07T23:12:39.385ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpcs?project=demo-project
216632025-03-07T23:12:39.385ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216642025-03-07T23:12:39.385ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 861238ed-bbd6-4463-8eb1-61ff962d8479 uri = /v1/vpcs?project=demo-project
216652025-03-07T23:12:39.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 861238ed-bbd6-4463-8eb1-61ff962d8479 response_code = 405 uri = /v1/vpcs?project=demo-project
216662025-03-07T23:12:39.386ZINFOtest_unauthorized (external client test context): client received response status = 405
216672025-03-07T23:12:39.386ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpcs?project=demo-project
216682025-03-07T23:12:39.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216692025-03-07T23:12:39.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 18fcfd87-af00-4881-a76f-39b78a066866 uri = /v1/vpcs?project=demo-project
216702025-03-07T23:12:39.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 18fcfd87-af00-4881-a76f-39b78a066866 response_code = 405 uri = /v1/vpcs?project=demo-project
216712025-03-07T23:12:39.387ZINFOtest_unauthorized (external client test context): client received response status = 405
216722025-03-07T23:12:39.387ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpcs?project=demo-project
216732025-03-07T23:12:39.387ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216742025-03-07T23:12:39.387ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 04a18ba8-5096-460d-9c6b-d4613df00b3d uri = /v1/vpcs?project=demo-project
216752025-03-07T23:12:39.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 04a18ba8-5096-460d-9c6b-d4613df00b3d response_code = 405 uri = /v1/vpcs?project=demo-project
216762025-03-07T23:12:39.390ZINFOtest_unauthorized (external client test context): client received response status = 405
216772025-03-07T23:12:39.390ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpcs?project=demo-project
216782025-03-07T23:12:39.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
216792025-03-07T23:12:39.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 uri = /v1/vpcs?project=demo-project
216802025-03-07T23:12:39.390ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 uri = /v1/vpcs?project=demo-project
216812025-03-07T23:12:39.392ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs?project=demo-project
216822025-03-07T23:12:39.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216832025-03-07T23:12:39.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216842025-03-07T23:12:39.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216852025-03-07T23:12:39.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216862025-03-07T23:12:39.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216872025-03-07T23:12:39.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216882025-03-07T23:12:39.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
216892025-03-07T23:12:39.392ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
216902025-03-07T23:12:39.393ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216912025-03-07T23:12:39.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216922025-03-07T23:12:39.393ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216932025-03-07T23:12:39.394ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
216942025-03-07T23:12:39.395ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216952025-03-07T23:12:39.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216962025-03-07T23:12:39.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216972025-03-07T23:12:39.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
216982025-03-07T23:12:39.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
216992025-03-07T23:12:39.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217002025-03-07T23:12:39.402ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217012025-03-07T23:12:39.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217022025-03-07T23:12:39.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
217032025-03-07T23:12:39.406ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
217042025-03-07T23:12:39.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217052025-03-07T23:12:39.406ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217062025-03-07T23:12:39.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217072025-03-07T23:12:39.410ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
217082025-03-07T23:12:39.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217092025-03-07T23:12:39.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217102025-03-07T23:12:39.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217112025-03-07T23:12:39.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
217122025-03-07T23:12:39.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
217132025-03-07T23:12:39.437ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 uri = /v1/vpcs?project=demo-project
217142025-03-07T23:12:39.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database uri = /v1/vpcs?project=demo-project
217152025-03-07T23:12:39.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217162025-03-07T23:12:39.437ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217172025-03-07T23:12:39.439ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database uri = /v1/vpcs?project=demo-project
217182025-03-07T23:12:39.440ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217192025-03-07T23:12:39.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217202025-03-07T23:12:39.443ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
217212025-03-07T23:12:39.443ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
217222025-03-07T23:12:39.444ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database uri = /v1/vpcs?project=demo-project
217232025-03-07T23:12:39.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217242025-03-07T23:12:39.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217252025-03-07T23:12:39.447ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
217262025-03-07T23:12:39.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database uri = /v1/vpcs?project=demo-project
217272025-03-07T23:12:39.447ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217282025-03-07T23:12:39.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217292025-03-07T23:12:39.451ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
217302025-03-07T23:12:39.451ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database uri = /v1/vpcs?project=demo-project
217312025-03-07T23:12:39.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217322025-03-07T23:12:39.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217332025-03-07T23:12:39.460ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217342025-03-07T23:12:39.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/vpcs?project=demo-project
217352025-03-07T23:12:39.475ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 92565 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72527259-fada-4f98-8e83-4e8d56dc3d50 response_code = 404 uri = /v1/vpcs?project=demo-project
217362025-03-07T23:12:39.476ZINFOtest_unauthorized (external client test context): client received response status = 404
217372025-03-07T23:12:39.476ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpcs?project=demo-project
217382025-03-07T23:12:39.476ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217392025-03-07T23:12:39.477ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b42a8efb-5b3b-4e5c-97c4-e996a1b15cee uri = /v1/vpcs?project=demo-project
217402025-03-07T23:12:39.477ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b42a8efb-5b3b-4e5c-97c4-e996a1b15cee uri = /v1/vpcs?project=demo-project
217412025-03-07T23:12:39.477ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b42a8efb-5b3b-4e5c-97c4-e996a1b15cee uri = /v1/vpcs?project=demo-project
217422025-03-07T23:12:39.477ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b42a8efb-5b3b-4e5c-97c4-e996a1b15cee uri = /v1/vpcs?project=demo-project
217432025-03-07T23:12:39.477ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 451 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b42a8efb-5b3b-4e5c-97c4-e996a1b15cee response_code = 401 uri = /v1/vpcs?project=demo-project
217442025-03-07T23:12:39.478ZINFOtest_unauthorized (external client test context): client received response status = 401
217452025-03-07T23:12:39.478ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpcs?project=demo-project
217462025-03-07T23:12:39.478ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217472025-03-07T23:12:39.478ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aa57039a-0593-4c81-9436-71370635e751 uri = /v1/vpcs?project=demo-project
217482025-03-07T23:12:39.478ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aa57039a-0593-4c81-9436-71370635e751 uri = /v1/vpcs?project=demo-project
217492025-03-07T23:12:39.478ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aa57039a-0593-4c81-9436-71370635e751 uri = /v1/vpcs?project=demo-project
217502025-03-07T23:12:39.478ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 355 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aa57039a-0593-4c81-9436-71370635e751 response_code = 401 uri = /v1/vpcs?project=demo-project
217512025-03-07T23:12:39.478ZINFOtest_unauthorized (external client test context): client received response status = 401
217522025-03-07T23:12:39.478ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpcs?project=demo-project
217532025-03-07T23:12:39.479ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217542025-03-07T23:12:39.479ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b02a02ac-c267-4a46-8179-6bc528d02d47 uri = /v1/vpcs?project=demo-project
217552025-03-07T23:12:39.479ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b02a02ac-c267-4a46-8179-6bc528d02d47 uri = /v1/vpcs?project=demo-project
217562025-03-07T23:12:39.480ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4944:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4955:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b02a02ac-c267-4a46-8179-6bc528d02d47 uri = /v1/vpcs?project=demo-project
217572025-03-07T23:12:39.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 942 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b02a02ac-c267-4a46-8179-6bc528d02d47 response_code = 401 uri = /v1/vpcs?project=demo-project
217582025-03-07T23:12:39.480ZINFOtest_unauthorized (external client test context): client received response status = 401
217592025-03-07T23:12:39.480ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpcs?project=demo-project
217602025-03-07T23:12:39.480ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217612025-03-07T23:12:39.480ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4719b1db-39c7-4b41-a434-03b6578b867b uri = /v1/vpcs?project=demo-project
217622025-03-07T23:12:39.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4719b1db-39c7-4b41-a434-03b6578b867b response_code = 405 uri = /v1/vpcs?project=demo-project
217632025-03-07T23:12:39.480ZINFOtest_unauthorized (external client test context): client received response status = 405
217642025-03-07T23:12:39.481ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpcs?project=demo-project
217652025-03-07T23:12:39.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217662025-03-07T23:12:39.481ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d0695edd-5aa5-4cb0-a9de-49155ee20250 uri = /v1/vpcs?project=demo-project
217672025-03-07T23:12:39.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d0695edd-5aa5-4cb0-a9de-49155ee20250 response_code = 405 uri = /v1/vpcs?project=demo-project
217682025-03-07T23:12:39.481ZINFOtest_unauthorized (external client test context): client received response status = 405
217692025-03-07T23:12:39.481ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpcs?project=demo-project
217702025-03-07T23:12:39.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217712025-03-07T23:12:39.481ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0d6bb135-2d3d-4373-9616-5f0cce7c62fa uri = /v1/vpcs?project=demo-project
217722025-03-07T23:12:39.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0d6bb135-2d3d-4373-9616-5f0cce7c62fa response_code = 405 uri = /v1/vpcs?project=demo-project
217732025-03-07T23:12:39.482ZINFOtest_unauthorized (external client test context): client received response status = 405
217742025-03-07T23:12:39.482ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpcs?project=demo-project
217752025-03-07T23:12:39.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217762025-03-07T23:12:39.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dde624fe-fdb1-4ea8-88a2-fdf6f3bb12c7 uri = /v1/vpcs?project=demo-project
217772025-03-07T23:12:39.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dde624fe-fdb1-4ea8-88a2-fdf6f3bb12c7 response_code = 405 uri = /v1/vpcs?project=demo-project
217782025-03-07T23:12:39.482ZINFOtest_unauthorized (external client test context): client received response status = 405
217792025-03-07T23:12:39.482ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpcs?project=demo-project
217802025-03-07T23:12:39.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217812025-03-07T23:12:39.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = da6b3e00-3993-48da-b2db-489cffe1db14 uri = /v1/vpcs?project=demo-project
217822025-03-07T23:12:39.483ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 220 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = da6b3e00-3993-48da-b2db-489cffe1db14 response_code = 405 uri = /v1/vpcs?project=demo-project
217832025-03-07T23:12:39.483ZINFOtest_unauthorized (external client test context): client received response status = 405
217842025-03-07T23:12:39.483ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpcs?project=demo-project
217852025-03-07T23:12:39.484ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217862025-03-07T23:12:39.484ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b938a1be-3998-495d-bef9-745792b3133e uri = /v1/vpcs?project=demo-project
217872025-03-07T23:12:39.484ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b938a1be-3998-495d-bef9-745792b3133e response_code = 405 uri = /v1/vpcs?project=demo-project
217882025-03-07T23:12:39.484ZINFOtest_unauthorized (external client test context): client received response status = 405
217892025-03-07T23:12:39.484ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpcs?project=demo-project
217902025-03-07T23:12:39.484ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217912025-03-07T23:12:39.484ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0cd2ff70-deac-44b9-9aaf-df4380205eb6 uri = /v1/vpcs?project=demo-project
217922025-03-07T23:12:39.484ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0cd2ff70-deac-44b9-9aaf-df4380205eb6 response_code = 405 uri = /v1/vpcs?project=demo-project
217932025-03-07T23:12:39.484ZINFOtest_unauthorized (external client test context): client received response status = 405
217942025-03-07T23:12:39.484ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpcs?project=demo-project
217952025-03-07T23:12:39.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
217962025-03-07T23:12:39.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 47cafd3a-342f-4cbb-b75f-0fda92e170cd uri = /v1/vpcs?project=demo-project
217972025-03-07T23:12:39.485ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 47cafd3a-342f-4cbb-b75f-0fda92e170cd response_code = 405 uri = /v1/vpcs?project=demo-project
217982025-03-07T23:12:39.485ZINFOtest_unauthorized (external client test context): client received response status = 405
217992025-03-07T23:12:39.485ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpcs?project=demo-project
218002025-03-07T23:12:39.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs?project=demo-project
218012025-03-07T23:12:39.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed uri = /v1/vpcs?project=demo-project
218022025-03-07T23:12:39.485ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed uri = /v1/vpcs?project=demo-project
218032025-03-07T23:12:39.485ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
218042025-03-07T23:12:39.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218052025-03-07T23:12:39.486ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218062025-03-07T23:12:39.486ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218072025-03-07T23:12:39.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218082025-03-07T23:12:39.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218092025-03-07T23:12:39.489ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218102025-03-07T23:12:39.491ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
218112025-03-07T23:12:39.491ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
218122025-03-07T23:12:39.491ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218132025-03-07T23:12:39.491ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218142025-03-07T23:12:39.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218152025-03-07T23:12:39.494ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
218162025-03-07T23:12:39.494ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218172025-03-07T23:12:39.494ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218182025-03-07T23:12:39.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218192025-03-07T23:12:39.496ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
218202025-03-07T23:12:39.499ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
218212025-03-07T23:12:39.500ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218222025-03-07T23:12:39.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218232025-03-07T23:12:39.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218242025-03-07T23:12:39.504ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
218252025-03-07T23:12:39.505ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
218262025-03-07T23:12:39.505ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218272025-03-07T23:12:39.505ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218282025-03-07T23:12:39.514ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218292025-03-07T23:12:39.514ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
218302025-03-07T23:12:39.514ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218312025-03-07T23:12:39.514ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218322025-03-07T23:12:39.514ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218332025-03-07T23:12:39.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
218342025-03-07T23:12:39.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
218352025-03-07T23:12:39.531ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed uri = /v1/vpcs?project=demo-project
218362025-03-07T23:12:39.531ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218372025-03-07T23:12:39.531ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218382025-03-07T23:12:39.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218392025-03-07T23:12:39.538ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218402025-03-07T23:12:39.538ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218412025-03-07T23:12:39.538ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218422025-03-07T23:12:39.548ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
218432025-03-07T23:12:39.548ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
218442025-03-07T23:12:39.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218452025-03-07T23:12:39.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218462025-03-07T23:12:39.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218472025-03-07T23:12:39.552ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
218482025-03-07T23:12:39.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218492025-03-07T23:12:39.554ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218502025-03-07T23:12:39.554ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218512025-03-07T23:12:39.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
218522025-03-07T23:12:39.572ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218532025-03-07T23:12:39.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = dd145fb5-18af-4201-b315-e69a15be08f1 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218542025-03-07T23:12:39.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = dd145fb5-18af-4201-b315-e69a15be08f1 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218552025-03-07T23:12:39.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = dd145fb5-18af-4201-b315-e69a15be08f1 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218562025-03-07T23:12:39.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = dd145fb5-18af-4201-b315-e69a15be08f1 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218572025-03-07T23:12:39.575ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
218582025-03-07T23:12:39.575ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218592025-03-07T23:12:39.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218602025-03-07T23:12:39.576ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218612025-03-07T23:12:39.579ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6609 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = dd145fb5-18af-4201-b315-e69a15be08f1 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
218622025-03-07T23:12:39.580ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "dd145fb5-18af-4201-b315-e69a15be08f1", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:38 GMT"} })
218632025-03-07T23:12:39.580ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218642025-03-07T23:12:39.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bc1c34d4-328f-4d2f-829d-d4f5677b9a52 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218652025-03-07T23:12:39.581ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bc1c34d4-328f-4d2f-829d-d4f5677b9a52 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218662025-03-07T23:12:39.581ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bc1c34d4-328f-4d2f-829d-d4f5677b9a52 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218672025-03-07T23:12:39.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bc1c34d4-328f-4d2f-829d-d4f5677b9a52 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218682025-03-07T23:12:39.585ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
218692025-03-07T23:12:39.594ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
218702025-03-07T23:12:39.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
218712025-03-07T23:12:39.594ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs?project=demo-project
218722025-03-07T23:12:39.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218732025-03-07T23:12:39.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218742025-03-07T23:12:39.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218752025-03-07T23:12:39.596ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218762025-03-07T23:12:39.596ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218772025-03-07T23:12:39.599ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 18267 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bc1c34d4-328f-4d2f-829d-d4f5677b9a52 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
218782025-03-07T23:12:39.600ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218792025-03-07T23:12:39.601ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218802025-03-07T23:12:39.602ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218812025-03-07T23:12:39.602ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218822025-03-07T23:12:39.602ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "bc1c34d4-328f-4d2f-829d-d4f5677b9a52", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:38 GMT"} })
218832025-03-07T23:12:39.602ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218842025-03-07T23:12:39.602ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
218852025-03-07T23:12:39.602ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
218862025-03-07T23:12:39.602ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
218872025-03-07T23:12:39.602ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218882025-03-07T23:12:39.602ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218892025-03-07T23:12:39.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218902025-03-07T23:12:39.608ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
218912025-03-07T23:12:39.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218922025-03-07T23:12:39.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218932025-03-07T23:12:39.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218942025-03-07T23:12:39.626ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
218952025-03-07T23:12:39.627ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
218962025-03-07T23:12:39.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
218972025-03-07T23:12:39.673ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
218982025-03-07T23:12:39.674ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database uri = /v1/vpcs?project=demo-project
218992025-03-07T23:12:39.674ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219002025-03-07T23:12:39.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219012025-03-07T23:12:39.676ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
219022025-03-07T23:12:39.676ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
219032025-03-07T23:12:39.676ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
219042025-03-07T23:12:39.676ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
219052025-03-07T23:12:39.680ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 194608 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 35da242b-08b9-401c-b4aa-891bf610e6ed response_code = 200 uri = /v1/vpcs?project=demo-project
219062025-03-07T23:12:39.680ZINFOtest_unauthorized (external client test context): client received response status = 200
219072025-03-07T23:12:39.681ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpcs/demo-vpc?project=demo-project
219082025-03-07T23:12:39.681ZINFOtest_unauthorized: test: privileged GET url = /v1/vpcs/demo-vpc?project=demo-project
219092025-03-07T23:12:39.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
219102025-03-07T23:12:39.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 uri = /v1/vpcs/demo-vpc?project=demo-project
219112025-03-07T23:12:39.682ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 uri = /v1/vpcs/demo-vpc?project=demo-project
219122025-03-07T23:12:39.682ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs/demo-vpc?project=demo-project
219132025-03-07T23:12:39.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219142025-03-07T23:12:39.682ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219152025-03-07T23:12:39.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219162025-03-07T23:12:39.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219172025-03-07T23:12:39.686ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219182025-03-07T23:12:39.687ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219192025-03-07T23:12:39.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
219202025-03-07T23:12:39.703ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
219212025-03-07T23:12:39.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219222025-03-07T23:12:39.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219232025-03-07T23:12:39.704ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219242025-03-07T23:12:39.708ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
219252025-03-07T23:12:39.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219262025-03-07T23:12:39.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219272025-03-07T23:12:39.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219282025-03-07T23:12:39.717ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
219292025-03-07T23:12:39.723ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
219302025-03-07T23:12:39.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219312025-03-07T23:12:39.724ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219322025-03-07T23:12:39.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219332025-03-07T23:12:39.745ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
219342025-03-07T23:12:39.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
219352025-03-07T23:12:39.747ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
219362025-03-07T23:12:39.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219372025-03-07T23:12:39.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219382025-03-07T23:12:39.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219392025-03-07T23:12:39.755ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
219402025-03-07T23:12:39.756ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
219412025-03-07T23:12:39.758ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
219422025-03-07T23:12:39.759ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219432025-03-07T23:12:39.759ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219442025-03-07T23:12:39.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219452025-03-07T23:12:39.766ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
219462025-03-07T23:12:39.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
219472025-03-07T23:12:39.772ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 uri = /v1/vpcs/demo-vpc?project=demo-project
219482025-03-07T23:12:39.772ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219492025-03-07T23:12:39.772ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219502025-03-07T23:12:39.773ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219512025-03-07T23:12:39.819ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219522025-03-07T23:12:39.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219532025-03-07T23:12:39.820ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219542025-03-07T23:12:39.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219552025-03-07T23:12:39.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219562025-03-07T23:12:39.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219572025-03-07T23:12:39.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
219582025-03-07T23:12:39.832ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
219592025-03-07T23:12:39.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219602025-03-07T23:12:39.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219612025-03-07T23:12:39.833ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219622025-03-07T23:12:39.843ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
219632025-03-07T23:12:39.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219642025-03-07T23:12:39.843ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219652025-03-07T23:12:39.843ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219662025-03-07T23:12:39.865ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
219672025-03-07T23:12:39.870ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
219682025-03-07T23:12:39.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
219692025-03-07T23:12:39.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219702025-03-07T23:12:39.871ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs/demo-vpc?project=demo-project
219712025-03-07T23:12:39.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
219722025-03-07T23:12:39.880ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 197856 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4a7fa74c-8399-4ce6-a140-9849ba57c910 response_code = 200 uri = /v1/vpcs/demo-vpc?project=demo-project
219732025-03-07T23:12:39.880ZINFOtest_unauthorized (external client test context): client received response status = 200
219742025-03-07T23:12:39.880ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpcs/demo-vpc?project=demo-project
219752025-03-07T23:12:39.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
219762025-03-07T23:12:39.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 uri = /v1/vpcs/demo-vpc?project=demo-project
219772025-03-07T23:12:39.880ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 uri = /v1/vpcs/demo-vpc?project=demo-project
219782025-03-07T23:12:39.881ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
219792025-03-07T23:12:39.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219802025-03-07T23:12:39.882ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219812025-03-07T23:12:39.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219822025-03-07T23:12:39.888ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219832025-03-07T23:12:39.890ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219842025-03-07T23:12:39.890ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219852025-03-07T23:12:39.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
219862025-03-07T23:12:39.895ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
219872025-03-07T23:12:39.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219882025-03-07T23:12:39.895ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219892025-03-07T23:12:39.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219902025-03-07T23:12:39.904ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
219912025-03-07T23:12:39.904ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219922025-03-07T23:12:39.904ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219932025-03-07T23:12:39.906ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219942025-03-07T23:12:39.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
219952025-03-07T23:12:39.915ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
219962025-03-07T23:12:39.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219972025-03-07T23:12:39.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219982025-03-07T23:12:39.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219992025-03-07T23:12:39.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
220002025-03-07T23:12:39.927ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
220012025-03-07T23:12:39.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220022025-03-07T23:12:39.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220032025-03-07T23:12:39.928ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220042025-03-07T23:12:39.932ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
220052025-03-07T23:12:39.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220062025-03-07T23:12:39.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220072025-03-07T23:12:39.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220082025-03-07T23:12:39.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
220092025-03-07T23:12:39.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
220102025-03-07T23:12:39.963ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 uri = /v1/vpcs/demo-vpc?project=demo-project
220112025-03-07T23:12:39.963ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220122025-03-07T23:12:39.963ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220132025-03-07T23:12:39.970ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220142025-03-07T23:12:39.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220152025-03-07T23:12:39.977ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220162025-03-07T23:12:39.978ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220172025-03-07T23:12:39.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220182025-03-07T23:12:39.981ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220192025-03-07T23:12:39.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220202025-03-07T23:12:39.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
220212025-03-07T23:12:39.990ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
220222025-03-07T23:12:39.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220232025-03-07T23:12:39.991ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220242025-03-07T23:12:39.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220252025-03-07T23:12:39.994ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
220262025-03-07T23:12:39.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220272025-03-07T23:12:39.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220282025-03-07T23:12:39.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220292025-03-07T23:12:40.000ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
220302025-03-07T23:12:40.000ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220312025-03-07T23:12:40.000ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220322025-03-07T23:12:40.000ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220332025-03-07T23:12:40.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220342025-03-07T23:12:40.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
220352025-03-07T23:12:40.026ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 145889 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bbc222aa-ef3b-433a-aa42-d5747ad97224 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
220362025-03-07T23:12:40.027ZINFOtest_unauthorized (external client test context): client received response status = 404
220372025-03-07T23:12:40.027ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpcs/demo-vpc?project=demo-project
220382025-03-07T23:12:40.027ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
220392025-03-07T23:12:40.028ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b735b280-f19a-44af-bb54-f93a7d5e1dd9 uri = /v1/vpcs/demo-vpc?project=demo-project
220402025-03-07T23:12:40.028ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b735b280-f19a-44af-bb54-f93a7d5e1dd9 uri = /v1/vpcs/demo-vpc?project=demo-project
220412025-03-07T23:12:40.028ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b735b280-f19a-44af-bb54-f93a7d5e1dd9 uri = /v1/vpcs/demo-vpc?project=demo-project
220422025-03-07T23:12:40.028ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b735b280-f19a-44af-bb54-f93a7d5e1dd9 uri = /v1/vpcs/demo-vpc?project=demo-project
220432025-03-07T23:12:40.029ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 909 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b735b280-f19a-44af-bb54-f93a7d5e1dd9 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
220442025-03-07T23:12:40.029ZINFOtest_unauthorized (external client test context): client received response status = 401
220452025-03-07T23:12:40.029ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpcs/demo-vpc?project=demo-project
220462025-03-07T23:12:40.029ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
220472025-03-07T23:12:40.029ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0f3f1816-4448-4b1c-aad9-48fc6d053a32 uri = /v1/vpcs/demo-vpc?project=demo-project
220482025-03-07T23:12:40.029ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0f3f1816-4448-4b1c-aad9-48fc6d053a32 uri = /v1/vpcs/demo-vpc?project=demo-project
220492025-03-07T23:12:40.030ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0f3f1816-4448-4b1c-aad9-48fc6d053a32 uri = /v1/vpcs/demo-vpc?project=demo-project
220502025-03-07T23:12:40.030ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 268 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0f3f1816-4448-4b1c-aad9-48fc6d053a32 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
220512025-03-07T23:12:40.030ZINFOtest_unauthorized (external client test context): client received response status = 401
220522025-03-07T23:12:40.030ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpcs/demo-vpc?project=demo-project
220532025-03-07T23:12:40.030ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
220542025-03-07T23:12:40.030ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92435128-4f12-4810-9d93-f7ca64c4fc3a uri = /v1/vpcs/demo-vpc?project=demo-project
220552025-03-07T23:12:40.030ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92435128-4f12-4810-9d93-f7ca64c4fc3a uri = /v1/vpcs/demo-vpc?project=demo-project
220562025-03-07T23:12:40.031ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4969:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4980:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92435128-4f12-4810-9d93-f7ca64c4fc3a uri = /v1/vpcs/demo-vpc?project=demo-project
220572025-03-07T23:12:40.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1028 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92435128-4f12-4810-9d93-f7ca64c4fc3a response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
220582025-03-07T23:12:40.031ZINFOtest_unauthorized (external client test context): client received response status = 401
220592025-03-07T23:12:40.032ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
220602025-03-07T23:12:40.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
220612025-03-07T23:12:40.035ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 uri = /v1/vpcs/demo-vpc?project=demo-project
220622025-03-07T23:12:40.035ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 uri = /v1/vpcs/demo-vpc?project=demo-project
220632025-03-07T23:12:40.035ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
220642025-03-07T23:12:40.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220652025-03-07T23:12:40.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220662025-03-07T23:12:40.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220672025-03-07T23:12:40.039ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220682025-03-07T23:12:40.039ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220692025-03-07T23:12:40.039ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220702025-03-07T23:12:40.042ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
220712025-03-07T23:12:40.042ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
220722025-03-07T23:12:40.043ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220732025-03-07T23:12:40.043ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220742025-03-07T23:12:40.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220752025-03-07T23:12:40.048ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
220762025-03-07T23:12:40.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220772025-03-07T23:12:40.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220782025-03-07T23:12:40.050ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220792025-03-07T23:12:40.052ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
220802025-03-07T23:12:40.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
220812025-03-07T23:12:40.056ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220822025-03-07T23:12:40.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220832025-03-07T23:12:40.057ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220842025-03-07T23:12:40.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
220852025-03-07T23:12:40.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
220862025-03-07T23:12:40.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220872025-03-07T23:12:40.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220882025-03-07T23:12:40.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220892025-03-07T23:12:40.069ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
220902025-03-07T23:12:40.069ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220912025-03-07T23:12:40.069ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220922025-03-07T23:12:40.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220932025-03-07T23:12:40.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
220942025-03-07T23:12:40.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
220952025-03-07T23:12:40.084ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 uri = /v1/vpcs/demo-vpc?project=demo-project
220962025-03-07T23:12:40.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
220972025-03-07T23:12:40.085ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
220982025-03-07T23:12:40.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
220992025-03-07T23:12:40.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221002025-03-07T23:12:40.088ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221012025-03-07T23:12:40.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221022025-03-07T23:12:40.112ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221032025-03-07T23:12:40.112ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221042025-03-07T23:12:40.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221052025-03-07T23:12:40.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
221062025-03-07T23:12:40.125ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
221072025-03-07T23:12:40.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221082025-03-07T23:12:40.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221092025-03-07T23:12:40.126ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221102025-03-07T23:12:40.137ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
221112025-03-07T23:12:40.137ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221122025-03-07T23:12:40.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221132025-03-07T23:12:40.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221142025-03-07T23:12:40.146ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
221152025-03-07T23:12:40.147ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221162025-03-07T23:12:40.147ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221172025-03-07T23:12:40.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221182025-03-07T23:12:40.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221192025-03-07T23:12:40.168ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
221202025-03-07T23:12:40.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 136367 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1131624d-0c25-4bc5-8e5b-e44cc3f31d72 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
221212025-03-07T23:12:40.169ZINFOtest_unauthorized (external client test context): client received response status = 404
221222025-03-07T23:12:40.169ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
221232025-03-07T23:12:40.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221242025-03-07T23:12:40.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2475c75f-6cf6-44bf-b6c8-98ab727654f3 uri = /v1/vpcs/demo-vpc?project=demo-project
221252025-03-07T23:12:40.170ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2475c75f-6cf6-44bf-b6c8-98ab727654f3 uri = /v1/vpcs/demo-vpc?project=demo-project
221262025-03-07T23:12:40.170ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2475c75f-6cf6-44bf-b6c8-98ab727654f3 uri = /v1/vpcs/demo-vpc?project=demo-project
221272025-03-07T23:12:40.170ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2475c75f-6cf6-44bf-b6c8-98ab727654f3 uri = /v1/vpcs/demo-vpc?project=demo-project
221282025-03-07T23:12:40.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 425 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2475c75f-6cf6-44bf-b6c8-98ab727654f3 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
221292025-03-07T23:12:40.181ZINFOtest_unauthorized (external client test context): client received response status = 401
221302025-03-07T23:12:40.181ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
221312025-03-07T23:12:40.182ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221322025-03-07T23:12:40.182ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d3f8d78-d8cf-4915-84fe-67ef9012ce7d uri = /v1/vpcs/demo-vpc?project=demo-project
221332025-03-07T23:12:40.182ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d3f8d78-d8cf-4915-84fe-67ef9012ce7d uri = /v1/vpcs/demo-vpc?project=demo-project
221342025-03-07T23:12:40.183ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d3f8d78-d8cf-4915-84fe-67ef9012ce7d uri = /v1/vpcs/demo-vpc?project=demo-project
221352025-03-07T23:12:40.183ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 672 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d3f8d78-d8cf-4915-84fe-67ef9012ce7d response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
221362025-03-07T23:12:40.183ZINFOtest_unauthorized (external client test context): client received response status = 401
221372025-03-07T23:12:40.184ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
221382025-03-07T23:12:40.184ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221392025-03-07T23:12:40.184ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9188508-5ba2-4b69-a887-3b0de6adfff8 uri = /v1/vpcs/demo-vpc?project=demo-project
221402025-03-07T23:12:40.184ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9188508-5ba2-4b69-a887-3b0de6adfff8 uri = /v1/vpcs/demo-vpc?project=demo-project
221412025-03-07T23:12:40.185ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4996:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5009:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9188508-5ba2-4b69-a887-3b0de6adfff8 uri = /v1/vpcs/demo-vpc?project=demo-project
221422025-03-07T23:12:40.185ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1808 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9188508-5ba2-4b69-a887-3b0de6adfff8 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
221432025-03-07T23:12:40.186ZINFOtest_unauthorized (external client test context): client received response status = 401
221442025-03-07T23:12:40.186ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpcs/demo-vpc?project=demo-project
221452025-03-07T23:12:40.187ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221462025-03-07T23:12:40.187ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 911cda55-f889-49a2-9034-f3f2534e6d60 uri = /v1/vpcs/demo-vpc?project=demo-project
221472025-03-07T23:12:40.187ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 911cda55-f889-49a2-9034-f3f2534e6d60 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
221482025-03-07T23:12:40.187ZINFOtest_unauthorized (external client test context): client received response status = 405
221492025-03-07T23:12:40.187ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpcs/demo-vpc?project=demo-project
221502025-03-07T23:12:40.187ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221512025-03-07T23:12:40.187ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28125e79-91f0-4603-b8ee-63e14bd568e1 uri = /v1/vpcs/demo-vpc?project=demo-project
221522025-03-07T23:12:40.187ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28125e79-91f0-4603-b8ee-63e14bd568e1 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
221532025-03-07T23:12:40.188ZINFOtest_unauthorized (external client test context): client received response status = 405
221542025-03-07T23:12:40.188ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpcs/demo-vpc?project=demo-project
221552025-03-07T23:12:40.188ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221562025-03-07T23:12:40.188ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93d62c67-c236-4744-ab2d-edf26a17a902 uri = /v1/vpcs/demo-vpc?project=demo-project
221572025-03-07T23:12:40.188ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 179 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93d62c67-c236-4744-ab2d-edf26a17a902 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
221582025-03-07T23:12:40.189ZINFOtest_unauthorized (external client test context): client received response status = 405
221592025-03-07T23:12:40.189ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpcs/demo-vpc?project=demo-project
221602025-03-07T23:12:40.189ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221612025-03-07T23:12:40.189ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef9f5276-b27f-4d8f-aa13-4f82aa0eb6cf uri = /v1/vpcs/demo-vpc?project=demo-project
221622025-03-07T23:12:40.190ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 152 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef9f5276-b27f-4d8f-aa13-4f82aa0eb6cf response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
221632025-03-07T23:12:40.191ZINFOtest_unauthorized (external client test context): client received response status = 405
221642025-03-07T23:12:40.191ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
221652025-03-07T23:12:40.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
221662025-03-07T23:12:40.191ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 uri = /v1/vpcs/demo-vpc?project=demo-project
221672025-03-07T23:12:40.191ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 uri = /v1/vpcs/demo-vpc?project=demo-project
221682025-03-07T23:12:40.191ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
221692025-03-07T23:12:40.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221702025-03-07T23:12:40.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221712025-03-07T23:12:40.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221722025-03-07T23:12:40.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221732025-03-07T23:12:40.197ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221742025-03-07T23:12:40.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221752025-03-07T23:12:40.199ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
221762025-03-07T23:12:40.200ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
221772025-03-07T23:12:40.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221782025-03-07T23:12:40.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221792025-03-07T23:12:40.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221802025-03-07T23:12:40.208ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
221812025-03-07T23:12:40.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221822025-03-07T23:12:40.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221832025-03-07T23:12:40.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221842025-03-07T23:12:40.223ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
221852025-03-07T23:12:40.223ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
221862025-03-07T23:12:40.224ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
221872025-03-07T23:12:40.224ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
221882025-03-07T23:12:40.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
221892025-03-07T23:12:40.227ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
221902025-03-07T23:12:40.227ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221912025-03-07T23:12:40.227ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221922025-03-07T23:12:40.228ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221932025-03-07T23:12:40.230ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
221942025-03-07T23:12:40.233ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
221952025-03-07T23:12:40.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221962025-03-07T23:12:40.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221972025-03-07T23:12:40.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221982025-03-07T23:12:40.233ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
221992025-03-07T23:12:40.233ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
222002025-03-07T23:12:40.234ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
222012025-03-07T23:12:40.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222022025-03-07T23:12:40.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222032025-03-07T23:12:40.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222042025-03-07T23:12:40.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
222052025-03-07T23:12:40.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
222062025-03-07T23:12:40.246ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 uri = /v1/vpcs/demo-vpc?project=demo-project
222072025-03-07T23:12:40.246ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222082025-03-07T23:12:40.246ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222092025-03-07T23:12:40.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222102025-03-07T23:12:40.247ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
222112025-03-07T23:12:40.247ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
222122025-03-07T23:12:40.247ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222132025-03-07T23:12:40.248ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222142025-03-07T23:12:40.248ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222152025-03-07T23:12:40.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222162025-03-07T23:12:40.250ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222172025-03-07T23:12:40.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222182025-03-07T23:12:40.253ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
222192025-03-07T23:12:40.254ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
222202025-03-07T23:12:40.254ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222212025-03-07T23:12:40.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222222025-03-07T23:12:40.254ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222232025-03-07T23:12:40.258ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
222242025-03-07T23:12:40.258ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222252025-03-07T23:12:40.258ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222262025-03-07T23:12:40.259ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222272025-03-07T23:12:40.273ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
222282025-03-07T23:12:40.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222292025-03-07T23:12:40.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222302025-03-07T23:12:40.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222312025-03-07T23:12:40.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222322025-03-07T23:12:40.318ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
222332025-03-07T23:12:40.319ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 128762 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d154128c-1e36-451c-8a02-1d1ff96b24d4 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
222342025-03-07T23:12:40.323ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
222352025-03-07T23:12:40.323ZINFOtest_unauthorized (external client test context): client received response status = 404
222362025-03-07T23:12:40.323ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
222372025-03-07T23:12:40.323ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222382025-03-07T23:12:40.324ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a6b64081-cfe1-4864-981c-58d885ada57b uri = /v1/vpcs/demo-vpc?project=demo-project
222392025-03-07T23:12:40.324ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a6b64081-cfe1-4864-981c-58d885ada57b uri = /v1/vpcs/demo-vpc?project=demo-project
222402025-03-07T23:12:40.325ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a6b64081-cfe1-4864-981c-58d885ada57b uri = /v1/vpcs/demo-vpc?project=demo-project
222412025-03-07T23:12:40.325ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a6b64081-cfe1-4864-981c-58d885ada57b uri = /v1/vpcs/demo-vpc?project=demo-project
222422025-03-07T23:12:40.326ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 557 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a6b64081-cfe1-4864-981c-58d885ada57b response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222432025-03-07T23:12:40.335ZINFOtest_unauthorized (external client test context): client received response status = 401
222442025-03-07T23:12:40.335ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
222452025-03-07T23:12:40.335ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222462025-03-07T23:12:40.335ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 565af86a-a992-438d-aed1-9d59534358cd uri = /v1/vpcs/demo-vpc?project=demo-project
222472025-03-07T23:12:40.335ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 565af86a-a992-438d-aed1-9d59534358cd uri = /v1/vpcs/demo-vpc?project=demo-project
222482025-03-07T23:12:40.335ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 565af86a-a992-438d-aed1-9d59534358cd uri = /v1/vpcs/demo-vpc?project=demo-project
222492025-03-07T23:12:40.335ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1769 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 565af86a-a992-438d-aed1-9d59534358cd response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222502025-03-07T23:12:40.335ZINFOtest_unauthorized (external client test context): client received response status = 401
222512025-03-07T23:12:40.335ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
222522025-03-07T23:12:40.335ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222532025-03-07T23:12:40.335ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 86b13214-9546-4258-85be-e073e3441813 uri = /v1/vpcs/demo-vpc?project=demo-project
222542025-03-07T23:12:40.335ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 86b13214-9546-4258-85be-e073e3441813 uri = /v1/vpcs/demo-vpc?project=demo-project
222552025-03-07T23:12:40.336ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5023:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5034:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 86b13214-9546-4258-85be-e073e3441813 uri = /v1/vpcs/demo-vpc?project=demo-project
222562025-03-07T23:12:40.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2174 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 86b13214-9546-4258-85be-e073e3441813 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222572025-03-07T23:12:40.336ZINFOtest_unauthorized (external client test context): client received response status = 401
222582025-03-07T23:12:40.336ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
222592025-03-07T23:12:40.336ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222602025-03-07T23:12:40.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1dc1e058-da20-4be5-aeed-d3fa0dd3fe6d uri = /v1/vpcs/demo-vpc?project=demo-project
222612025-03-07T23:12:40.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1dc1e058-da20-4be5-aeed-d3fa0dd3fe6d response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
222622025-03-07T23:12:40.336ZINFOtest_unauthorized (external client test context): client received response status = 405
222632025-03-07T23:12:40.336ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
222642025-03-07T23:12:40.336ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222652025-03-07T23:12:40.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0a54ea39-ffa1-4484-93b2-e83bd6434c35 uri = /v1/vpcs/demo-vpc?project=demo-project
222662025-03-07T23:12:40.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0a54ea39-ffa1-4484-93b2-e83bd6434c35 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
222672025-03-07T23:12:40.336ZINFOtest_unauthorized (external client test context): client received response status = 405
222682025-03-07T23:12:40.337ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
222692025-03-07T23:12:40.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222702025-03-07T23:12:40.338ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ee4e5e7a-a057-4627-8251-c1fb0a2cb4d4 uri = /v1/vpcs/demo-vpc?project=demo-project
222712025-03-07T23:12:40.338ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 290 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ee4e5e7a-a057-4627-8251-c1fb0a2cb4d4 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
222722025-03-07T23:12:40.339ZINFOtest_unauthorized (external client test context): client received response status = 405
222732025-03-07T23:12:40.339ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
222742025-03-07T23:12:40.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222752025-03-07T23:12:40.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b881923a-e52f-4d59-8dbd-a80b52d63acd uri = /v1/vpcs/demo-vpc?project=demo-project
222762025-03-07T23:12:40.341ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b881923a-e52f-4d59-8dbd-a80b52d63acd response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
222772025-03-07T23:12:40.341ZINFOtest_unauthorized (external client test context): client received response status = 405
222782025-03-07T23:12:40.342ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpcs/demo-vpc?project=demo-project
222792025-03-07T23:12:40.343ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpcs/demo-vpc?project=demo-project
222802025-03-07T23:12:40.343ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f uri = /v1/vpcs/demo-vpc?project=demo-project
222812025-03-07T23:12:40.343ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f uri = /v1/vpcs/demo-vpc?project=demo-project
222822025-03-07T23:12:40.343ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs/demo-vpc?project=demo-project
222832025-03-07T23:12:40.343ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222842025-03-07T23:12:40.343ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222852025-03-07T23:12:40.346ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222862025-03-07T23:12:40.352ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222872025-03-07T23:12:40.352ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222882025-03-07T23:12:40.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222892025-03-07T23:12:40.356ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
222902025-03-07T23:12:40.357ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
222912025-03-07T23:12:40.357ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222922025-03-07T23:12:40.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222932025-03-07T23:12:40.358ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222942025-03-07T23:12:40.359ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
222952025-03-07T23:12:40.359ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222962025-03-07T23:12:40.360ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222972025-03-07T23:12:40.360ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222982025-03-07T23:12:40.362ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
222992025-03-07T23:12:40.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
223002025-03-07T23:12:40.367ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223012025-03-07T23:12:40.367ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223022025-03-07T23:12:40.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223032025-03-07T23:12:40.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
223042025-03-07T23:12:40.371ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
223052025-03-07T23:12:40.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223062025-03-07T23:12:40.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223072025-03-07T23:12:40.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223082025-03-07T23:12:40.374ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
223092025-03-07T23:12:40.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223102025-03-07T23:12:40.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223112025-03-07T23:12:40.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223122025-03-07T23:12:40.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
223132025-03-07T23:12:40.385ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
223142025-03-07T23:12:40.386ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f uri = /v1/vpcs/demo-vpc?project=demo-project
223152025-03-07T23:12:40.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223162025-03-07T23:12:40.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223172025-03-07T23:12:40.402ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223182025-03-07T23:12:40.406ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223192025-03-07T23:12:40.407ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223202025-03-07T23:12:40.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223212025-03-07T23:12:40.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223222025-03-07T23:12:40.426ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223232025-03-07T23:12:40.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223242025-03-07T23:12:40.429ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
223252025-03-07T23:12:40.430ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
223262025-03-07T23:12:40.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223272025-03-07T23:12:40.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223282025-03-07T23:12:40.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223292025-03-07T23:12:40.434ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
223302025-03-07T23:12:40.434ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223312025-03-07T23:12:40.434ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223322025-03-07T23:12:40.434ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223332025-03-07T23:12:40.438ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
223342025-03-07T23:12:40.440ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223352025-03-07T23:12:40.440ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223362025-03-07T23:12:40.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223372025-03-07T23:12:40.443ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs/demo-vpc?project=demo-project
223382025-03-07T23:12:40.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223392025-03-07T23:12:40.452ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 108010 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 98b3f224-9c45-4b7e-bd9c-1d0b1e87351f response_code = 200 uri = /v1/vpcs/demo-vpc?project=demo-project
223402025-03-07T23:12:40.452ZINFOtest_unauthorized (external client test context): client received response status = 200
223412025-03-07T23:12:40.452ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223422025-03-07T23:12:40.452ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223432025-03-07T23:12:40.452ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223442025-03-07T23:12:40.452ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223452025-03-07T23:12:40.452ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223462025-03-07T23:12:40.452ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223472025-03-07T23:12:40.452ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223482025-03-07T23:12:40.452ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223492025-03-07T23:12:40.452ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223502025-03-07T23:12:40.459ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223512025-03-07T23:12:40.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223522025-03-07T23:12:40.460ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223532025-03-07T23:12:40.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
223542025-03-07T23:12:40.476ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
223552025-03-07T23:12:40.476ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223562025-03-07T23:12:40.476ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223572025-03-07T23:12:40.479ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223582025-03-07T23:12:40.496ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
223592025-03-07T23:12:40.496ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223602025-03-07T23:12:40.496ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223612025-03-07T23:12:40.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223622025-03-07T23:12:40.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
223632025-03-07T23:12:40.504ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
223642025-03-07T23:12:40.506ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223652025-03-07T23:12:40.506ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223662025-03-07T23:12:40.506ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223672025-03-07T23:12:40.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
223682025-03-07T23:12:40.523ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
223692025-03-07T23:12:40.523ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223702025-03-07T23:12:40.523ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223712025-03-07T23:12:40.523ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223722025-03-07T23:12:40.523ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
223732025-03-07T23:12:40.526ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223742025-03-07T23:12:40.528ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223752025-03-07T23:12:40.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223762025-03-07T23:12:40.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
223772025-03-07T23:12:40.553ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
223782025-03-07T23:12:40.556ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223792025-03-07T23:12:40.563ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223802025-03-07T23:12:40.563ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223812025-03-07T23:12:40.563ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223822025-03-07T23:12:40.565ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223832025-03-07T23:12:40.567ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223842025-03-07T23:12:40.567ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223852025-03-07T23:12:40.589ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223862025-03-07T23:12:40.589ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223872025-03-07T23:12:40.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223882025-03-07T23:12:40.593ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223892025-03-07T23:12:40.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223902025-03-07T23:12:40.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
223912025-03-07T23:12:40.593ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223922025-03-07T23:12:40.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223932025-03-07T23:12:40.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223942025-03-07T23:12:40.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223952025-03-07T23:12:40.600ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223962025-03-07T23:12:40.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223972025-03-07T23:12:40.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223982025-03-07T23:12:40.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
223992025-03-07T23:12:40.608ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224002025-03-07T23:12:40.611ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224012025-03-07T23:12:40.611ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224022025-03-07T23:12:40.611ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224032025-03-07T23:12:40.613ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224042025-03-07T23:12:40.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224052025-03-07T23:12:40.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224062025-03-07T23:12:40.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224072025-03-07T23:12:40.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224082025-03-07T23:12:40.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224092025-03-07T23:12:40.644ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224102025-03-07T23:12:40.646ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224112025-03-07T23:12:40.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224122025-03-07T23:12:40.646ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224132025-03-07T23:12:40.648ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224142025-03-07T23:12:40.652ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224152025-03-07T23:12:40.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224162025-03-07T23:12:40.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224172025-03-07T23:12:40.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224182025-03-07T23:12:40.662ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224192025-03-07T23:12:40.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224202025-03-07T23:12:40.666ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224212025-03-07T23:12:40.666ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224222025-03-07T23:12:40.666ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224232025-03-07T23:12:40.673ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224242025-03-07T23:12:40.674ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224252025-03-07T23:12:40.674ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224262025-03-07T23:12:40.678ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224272025-03-07T23:12:40.685ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 232080 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1872c4fd-217f-4889-9232-aeb68b4fcc8f response_code = 200 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224282025-03-07T23:12:40.685ZINFOtest_unauthorized (external client test context): client received response status = 200
224292025-03-07T23:12:40.685ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224302025-03-07T23:12:40.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224312025-03-07T23:12:40.687ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224322025-03-07T23:12:40.687ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224332025-03-07T23:12:40.687ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224342025-03-07T23:12:40.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224352025-03-07T23:12:40.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224362025-03-07T23:12:40.687ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224372025-03-07T23:12:40.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224382025-03-07T23:12:40.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224392025-03-07T23:12:40.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224402025-03-07T23:12:40.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
224412025-03-07T23:12:40.698ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
224422025-03-07T23:12:40.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224432025-03-07T23:12:40.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224442025-03-07T23:12:40.699ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224452025-03-07T23:12:40.702ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
224462025-03-07T23:12:40.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224472025-03-07T23:12:40.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224482025-03-07T23:12:40.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224492025-03-07T23:12:40.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
224502025-03-07T23:12:40.712ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
224512025-03-07T23:12:40.712ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224522025-03-07T23:12:40.712ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224532025-03-07T23:12:40.716ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224542025-03-07T23:12:40.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
224552025-03-07T23:12:40.719ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
224562025-03-07T23:12:40.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224572025-03-07T23:12:40.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224582025-03-07T23:12:40.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224592025-03-07T23:12:40.722ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
224602025-03-07T23:12:40.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224612025-03-07T23:12:40.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224622025-03-07T23:12:40.724ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224632025-03-07T23:12:40.732ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
224642025-03-07T23:12:40.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
224652025-03-07T23:12:40.741ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224662025-03-07T23:12:40.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224672025-03-07T23:12:40.747ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224682025-03-07T23:12:40.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224692025-03-07T23:12:40.751ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224702025-03-07T23:12:40.751ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224712025-03-07T23:12:40.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224722025-03-07T23:12:40.751ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224732025-03-07T23:12:40.751ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224742025-03-07T23:12:40.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224752025-03-07T23:12:40.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224762025-03-07T23:12:40.753ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224772025-03-07T23:12:40.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224782025-03-07T23:12:40.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224792025-03-07T23:12:40.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224802025-03-07T23:12:40.776ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224812025-03-07T23:12:40.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224822025-03-07T23:12:40.778ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224832025-03-07T23:12:40.778ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224842025-03-07T23:12:40.791ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224852025-03-07T23:12:40.791ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224862025-03-07T23:12:40.791ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224872025-03-07T23:12:40.794ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224882025-03-07T23:12:40.835ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224892025-03-07T23:12:40.852ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224902025-03-07T23:12:40.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 168189 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 62438e74-ef6c-4bfa-914d-af97d1e574f1 response_code = 404 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224912025-03-07T23:12:40.853ZINFOtest_unauthorized (external client test context): client received response status = 404
224922025-03-07T23:12:40.853ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224932025-03-07T23:12:40.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224942025-03-07T23:12:40.855ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a11eb78-58ec-4a62-a9db-e05e1075b1f6 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224952025-03-07T23:12:40.859ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a11eb78-58ec-4a62-a9db-e05e1075b1f6 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224962025-03-07T23:12:40.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a11eb78-58ec-4a62-a9db-e05e1075b1f6 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224972025-03-07T23:12:40.860ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a11eb78-58ec-4a62-a9db-e05e1075b1f6 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224982025-03-07T23:12:40.860ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 518 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a11eb78-58ec-4a62-a9db-e05e1075b1f6 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
224992025-03-07T23:12:40.862ZINFOtest_unauthorized (external client test context): client received response status = 401
225002025-03-07T23:12:40.863ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225012025-03-07T23:12:40.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225022025-03-07T23:12:40.863ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a0658c4b-ea79-431f-9f49-d30713fb1fcd uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225032025-03-07T23:12:40.863ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a0658c4b-ea79-431f-9f49-d30713fb1fcd uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225042025-03-07T23:12:40.863ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a0658c4b-ea79-431f-9f49-d30713fb1fcd uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225052025-03-07T23:12:40.863ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1622 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a0658c4b-ea79-431f-9f49-d30713fb1fcd response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225062025-03-07T23:12:40.863ZINFOtest_unauthorized (external client test context): client received response status = 401
225072025-03-07T23:12:40.863ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225082025-03-07T23:12:40.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225092025-03-07T23:12:40.869ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2aa855ac-1d76-44e9-a3e9-9ddce2b4e34c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225102025-03-07T23:12:40.869ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2aa855ac-1d76-44e9-a3e9-9ddce2b4e34c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225112025-03-07T23:12:40.871ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5249:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5263:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2aa855ac-1d76-44e9-a3e9-9ddce2b4e34c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225122025-03-07T23:12:40.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1281 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2aa855ac-1d76-44e9-a3e9-9ddce2b4e34c response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225132025-03-07T23:12:40.889ZINFOtest_unauthorized (external client test context): client received response status = 401
225142025-03-07T23:12:40.889ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225152025-03-07T23:12:40.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225162025-03-07T23:12:40.890ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225172025-03-07T23:12:40.891ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225182025-03-07T23:12:40.891ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225192025-03-07T23:12:40.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225202025-03-07T23:12:40.891ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225212025-03-07T23:12:40.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225222025-03-07T23:12:40.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225232025-03-07T23:12:40.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225242025-03-07T23:12:40.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225252025-03-07T23:12:40.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
225262025-03-07T23:12:40.917ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225272025-03-07T23:12:40.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225282025-03-07T23:12:40.917ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225292025-03-07T23:12:40.917ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225302025-03-07T23:12:40.919ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225312025-03-07T23:12:40.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225322025-03-07T23:12:40.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225332025-03-07T23:12:40.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225342025-03-07T23:12:40.924ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225352025-03-07T23:12:40.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
225362025-03-07T23:12:40.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225372025-03-07T23:12:40.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225382025-03-07T23:12:40.934ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225392025-03-07T23:12:40.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
225402025-03-07T23:12:40.939ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225412025-03-07T23:12:40.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225422025-03-07T23:12:40.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225432025-03-07T23:12:40.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225442025-03-07T23:12:40.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225452025-03-07T23:12:40.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225462025-03-07T23:12:40.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225472025-03-07T23:12:40.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225482025-03-07T23:12:40.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225492025-03-07T23:12:40.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
225502025-03-07T23:12:40.950ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225512025-03-07T23:12:40.950ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225522025-03-07T23:12:40.950ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225532025-03-07T23:12:40.951ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225542025-03-07T23:12:40.963ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225552025-03-07T23:12:40.963ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225562025-03-07T23:12:40.964ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225572025-03-07T23:12:40.967ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225582025-03-07T23:12:40.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225592025-03-07T23:12:40.970ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225602025-03-07T23:12:40.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225612025-03-07T23:12:40.974ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225622025-03-07T23:12:40.974ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225632025-03-07T23:12:40.974ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225642025-03-07T23:12:40.974ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225652025-03-07T23:12:40.975ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225662025-03-07T23:12:40.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225672025-03-07T23:12:40.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225682025-03-07T23:12:40.977ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225692025-03-07T23:12:40.979ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225702025-03-07T23:12:40.981ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225712025-03-07T23:12:40.981ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225722025-03-07T23:12:40.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225732025-03-07T23:12:40.984ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225742025-03-07T23:12:41.003ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225752025-03-07T23:12:41.004ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 113630 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a1a3ea53-bde6-49a8-bd7e-424cdd354ddc response_code = 404 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225762025-03-07T23:12:41.004ZINFOtest_unauthorized (external client test context): client received response status = 404
225772025-03-07T23:12:41.005ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225782025-03-07T23:12:41.005ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225792025-03-07T23:12:41.005ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9155507-24db-4c80-ada1-2f4655653cec uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225802025-03-07T23:12:41.005ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9155507-24db-4c80-ada1-2f4655653cec uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225812025-03-07T23:12:41.005ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9155507-24db-4c80-ada1-2f4655653cec uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225822025-03-07T23:12:41.005ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9155507-24db-4c80-ada1-2f4655653cec uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225832025-03-07T23:12:41.005ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 376 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b9155507-24db-4c80-ada1-2f4655653cec response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225842025-03-07T23:12:41.006ZINFOtest_unauthorized (external client test context): client received response status = 401
225852025-03-07T23:12:41.006ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225862025-03-07T23:12:41.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225872025-03-07T23:12:41.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 77188506-d0f7-4997-aa7f-c36b7bca35b8 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225882025-03-07T23:12:41.008ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 77188506-d0f7-4997-aa7f-c36b7bca35b8 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225892025-03-07T23:12:41.008ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 77188506-d0f7-4997-aa7f-c36b7bca35b8 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225902025-03-07T23:12:41.008ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 274 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 77188506-d0f7-4997-aa7f-c36b7bca35b8 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225912025-03-07T23:12:41.009ZINFOtest_unauthorized (external client test context): client received response status = 401
225922025-03-07T23:12:41.009ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225932025-03-07T23:12:41.009ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225942025-03-07T23:12:41.009ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71231258-5912-425f-a85c-407890e03e18 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225952025-03-07T23:12:41.009ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71231258-5912-425f-a85c-407890e03e18 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225962025-03-07T23:12:41.009ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5279:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5295:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>), dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71231258-5912-425f-a85c-407890e03e18 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225972025-03-07T23:12:41.009ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 899 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71231258-5912-425f-a85c-407890e03e18 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225982025-03-07T23:12:41.009ZINFOtest_unauthorized (external client test context): client received response status = 401
225992025-03-07T23:12:41.011ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226002025-03-07T23:12:41.011ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226012025-03-07T23:12:41.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cc504946-b02e-45f7-9e77-eba24b0e10eb uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226022025-03-07T23:12:41.011ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cc504946-b02e-45f7-9e77-eba24b0e10eb response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226032025-03-07T23:12:41.011ZINFOtest_unauthorized (external client test context): client received response status = 405
226042025-03-07T23:12:41.011ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226052025-03-07T23:12:41.011ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226062025-03-07T23:12:41.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c8fe5b55-570f-4b62-9e72-1fd28bb2f2f2 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226072025-03-07T23:12:41.011ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c8fe5b55-570f-4b62-9e72-1fd28bb2f2f2 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226082025-03-07T23:12:41.011ZINFOtest_unauthorized (external client test context): client received response status = 405
226092025-03-07T23:12:41.012ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226102025-03-07T23:12:41.012ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226112025-03-07T23:12:41.012ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8ca23aae-0786-45b0-9592-e76a16d202be uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226122025-03-07T23:12:41.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8ca23aae-0786-45b0-9592-e76a16d202be response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226132025-03-07T23:12:41.012ZINFOtest_unauthorized (external client test context): client received response status = 405
226142025-03-07T23:12:41.012ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226152025-03-07T23:12:41.012ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226162025-03-07T23:12:41.012ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e18cf960-a299-4a49-a5e1-659e2a25e276 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226172025-03-07T23:12:41.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e18cf960-a299-4a49-a5e1-659e2a25e276 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226182025-03-07T23:12:41.012ZINFOtest_unauthorized (external client test context): client received response status = 405
226192025-03-07T23:12:41.012ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226202025-03-07T23:12:41.012ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226212025-03-07T23:12:41.012ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 85363b6a-b819-4a58-adf0-216130686d7b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226222025-03-07T23:12:41.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 85363b6a-b819-4a58-adf0-216130686d7b response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226232025-03-07T23:12:41.013ZINFOtest_unauthorized (external client test context): client received response status = 405
226242025-03-07T23:12:41.014ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226252025-03-07T23:12:41.014ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226262025-03-07T23:12:41.014ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 94a7942c-d5f4-4264-98cd-d4217fa90548 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226272025-03-07T23:12:41.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 160 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 94a7942c-d5f4-4264-98cd-d4217fa90548 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226282025-03-07T23:12:41.015ZINFOtest_unauthorized (external client test context): client received response status = 405
226292025-03-07T23:12:41.015ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226302025-03-07T23:12:41.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226312025-03-07T23:12:41.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c8a5d00e-8693-4b6d-9589-9f141c087349 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226322025-03-07T23:12:41.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c8a5d00e-8693-4b6d-9589-9f141c087349 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226332025-03-07T23:12:41.015ZINFOtest_unauthorized (external client test context): client received response status = 405
226342025-03-07T23:12:41.015ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226352025-03-07T23:12:41.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226362025-03-07T23:12:41.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7063359c-d98a-4142-9a70-1eb4d36d2025 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226372025-03-07T23:12:41.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7063359c-d98a-4142-9a70-1eb4d36d2025 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226382025-03-07T23:12:41.017ZINFOtest_unauthorized (external client test context): client received response status = 405
226392025-03-07T23:12:41.017ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226402025-03-07T23:12:41.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226412025-03-07T23:12:41.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cc7dcaa8-bb8f-4a29-9bea-94a4cacf4e38 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226422025-03-07T23:12:41.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cc7dcaa8-bb8f-4a29-9bea-94a4cacf4e38 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226432025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client received response status = 405
226442025-03-07T23:12:41.018ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226452025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226462025-03-07T23:12:41.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5537a288-07c0-4719-947a-316d94606511 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226472025-03-07T23:12:41.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 265 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5537a288-07c0-4719-947a-316d94606511 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226482025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client received response status = 405
226492025-03-07T23:12:41.018ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226502025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226512025-03-07T23:12:41.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 739941d3-819b-4309-b1b9-a313a4cfd21b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226522025-03-07T23:12:41.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 739941d3-819b-4309-b1b9-a313a4cfd21b response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226532025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client received response status = 405
226542025-03-07T23:12:41.018ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226552025-03-07T23:12:41.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226562025-03-07T23:12:41.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b68a6be0-87df-49e1-9089-dfeda796cadb uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226572025-03-07T23:12:41.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b68a6be0-87df-49e1-9089-dfeda796cadb response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226582025-03-07T23:12:41.020ZINFOtest_unauthorized (external client test context): client received response status = 405
226592025-03-07T23:12:41.020ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226602025-03-07T23:12:41.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226612025-03-07T23:12:41.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226622025-03-07T23:12:41.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226632025-03-07T23:12:41.020ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226642025-03-07T23:12:41.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226652025-03-07T23:12:41.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226662025-03-07T23:12:41.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226672025-03-07T23:12:41.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226682025-03-07T23:12:41.021ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226692025-03-07T23:12:41.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226702025-03-07T23:12:41.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
226712025-03-07T23:12:41.022ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
226722025-03-07T23:12:41.022ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226732025-03-07T23:12:41.022ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226742025-03-07T23:12:41.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226752025-03-07T23:12:41.025ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
226762025-03-07T23:12:41.025ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226772025-03-07T23:12:41.025ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226782025-03-07T23:12:41.027ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226792025-03-07T23:12:41.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
226802025-03-07T23:12:41.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
226812025-03-07T23:12:41.033ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226822025-03-07T23:12:41.033ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226832025-03-07T23:12:41.033ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226842025-03-07T23:12:41.036ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
226852025-03-07T23:12:41.036ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
226862025-03-07T23:12:41.036ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226872025-03-07T23:12:41.036ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226882025-03-07T23:12:41.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226892025-03-07T23:12:41.038ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
226902025-03-07T23:12:41.039ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226912025-03-07T23:12:41.039ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226922025-03-07T23:12:41.039ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226932025-03-07T23:12:41.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
226942025-03-07T23:12:41.043ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
226952025-03-07T23:12:41.044ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226962025-03-07T23:12:41.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226972025-03-07T23:12:41.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226982025-03-07T23:12:41.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226992025-03-07T23:12:41.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227002025-03-07T23:12:41.049ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227012025-03-07T23:12:41.050ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227022025-03-07T23:12:41.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227032025-03-07T23:12:41.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227042025-03-07T23:12:41.050ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227052025-03-07T23:12:41.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227062025-03-07T23:12:41.054ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227072025-03-07T23:12:41.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227082025-03-07T23:12:41.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227092025-03-07T23:12:41.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227102025-03-07T23:12:41.057ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227112025-03-07T23:12:41.059ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227122025-03-07T23:12:41.059ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227132025-03-07T23:12:41.059ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227142025-03-07T23:12:41.063ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227152025-03-07T23:12:41.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227162025-03-07T23:12:41.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227172025-03-07T23:12:41.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227182025-03-07T23:12:41.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227192025-03-07T23:12:41.083ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227202025-03-07T23:12:41.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227212025-03-07T23:12:41.083ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227222025-03-07T23:12:41.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227232025-03-07T23:12:41.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227242025-03-07T23:12:41.084ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227252025-03-07T23:12:41.088ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227262025-03-07T23:12:41.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227272025-03-07T23:12:41.091ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227282025-03-07T23:12:41.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227292025-03-07T23:12:41.094ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227302025-03-07T23:12:41.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227312025-03-07T23:12:41.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227322025-03-07T23:12:41.095ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227332025-03-07T23:12:41.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227342025-03-07T23:12:41.106ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227352025-03-07T23:12:41.107ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227362025-03-07T23:12:41.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227372025-03-07T23:12:41.108ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227382025-03-07T23:12:41.113ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 97846 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19920f5e-266f-4056-afe9-1d3711f5040c response_code = 200 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227392025-03-07T23:12:41.113ZINFOtest_unauthorized (external client test context): client received response status = 200
227402025-03-07T23:12:41.114ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227412025-03-07T23:12:41.117ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227422025-03-07T23:12:41.117ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227432025-03-07T23:12:41.117ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227442025-03-07T23:12:41.117ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227452025-03-07T23:12:41.117ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227462025-03-07T23:12:41.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227472025-03-07T23:12:41.117ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227482025-03-07T23:12:41.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227492025-03-07T23:12:41.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227502025-03-07T23:12:41.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227512025-03-07T23:12:41.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227522025-03-07T23:12:41.125ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
227532025-03-07T23:12:41.131ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
227542025-03-07T23:12:41.131ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227552025-03-07T23:12:41.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227562025-03-07T23:12:41.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227572025-03-07T23:12:41.131ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
227582025-03-07T23:12:41.131ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227592025-03-07T23:12:41.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227602025-03-07T23:12:41.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227612025-03-07T23:12:41.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
227622025-03-07T23:12:41.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
227632025-03-07T23:12:41.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227642025-03-07T23:12:41.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227652025-03-07T23:12:41.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227662025-03-07T23:12:41.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
227672025-03-07T23:12:41.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
227682025-03-07T23:12:41.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227692025-03-07T23:12:41.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227702025-03-07T23:12:41.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227712025-03-07T23:12:41.142ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
227722025-03-07T23:12:41.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227732025-03-07T23:12:41.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227742025-03-07T23:12:41.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227752025-03-07T23:12:41.149ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
227762025-03-07T23:12:41.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
227772025-03-07T23:12:41.157ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227782025-03-07T23:12:41.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227792025-03-07T23:12:41.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227802025-03-07T23:12:41.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227812025-03-07T23:12:41.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227822025-03-07T23:12:41.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227832025-03-07T23:12:41.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227842025-03-07T23:12:41.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227852025-03-07T23:12:41.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227862025-03-07T23:12:41.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227872025-03-07T23:12:41.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227882025-03-07T23:12:41.165ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227892025-03-07T23:12:41.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227902025-03-07T23:12:41.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227912025-03-07T23:12:41.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227922025-03-07T23:12:41.170ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227932025-03-07T23:12:41.170ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227942025-03-07T23:12:41.170ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227952025-03-07T23:12:41.186ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227962025-03-07T23:12:41.192ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227972025-03-07T23:12:41.192ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227982025-03-07T23:12:41.193ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
227992025-03-07T23:12:41.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228002025-03-07T23:12:41.199ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228012025-03-07T23:12:41.212ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228022025-03-07T23:12:41.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228032025-03-07T23:12:41.216ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228042025-03-07T23:12:41.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228052025-03-07T23:12:41.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228062025-03-07T23:12:41.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228072025-03-07T23:12:41.218ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228082025-03-07T23:12:41.220ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228092025-03-07T23:12:41.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228102025-03-07T23:12:41.222ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228112025-03-07T23:12:41.222ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
228122025-03-07T23:12:41.222ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
228132025-03-07T23:12:41.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
228142025-03-07T23:12:41.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
228152025-03-07T23:12:41.224ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228162025-03-07T23:12:41.232ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228172025-03-07T23:12:41.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228182025-03-07T23:12:41.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228192025-03-07T23:12:41.239ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228202025-03-07T23:12:41.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228212025-03-07T23:12:41.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228222025-03-07T23:12:41.243ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228232025-03-07T23:12:41.243ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228242025-03-07T23:12:41.244ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
228252025-03-07T23:12:41.244ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
228262025-03-07T23:12:41.246ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
228272025-03-07T23:12:41.249ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
228282025-03-07T23:12:41.249ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 132619 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9d8fd03d-a7f0-4b8f-9d25-798a63abbb47 response_code = 200 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228292025-03-07T23:12:41.249ZINFOtest_unauthorized (external client test context): client received response status = 200
228302025-03-07T23:12:41.249ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228312025-03-07T23:12:41.249ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228322025-03-07T23:12:41.249ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228332025-03-07T23:12:41.250ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228342025-03-07T23:12:41.250ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228352025-03-07T23:12:41.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228362025-03-07T23:12:41.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228372025-03-07T23:12:41.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228382025-03-07T23:12:41.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228392025-03-07T23:12:41.254ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228402025-03-07T23:12:41.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228412025-03-07T23:12:41.255ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
228422025-03-07T23:12:41.255ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
228432025-03-07T23:12:41.255ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228442025-03-07T23:12:41.256ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228452025-03-07T23:12:41.256ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228462025-03-07T23:12:41.263ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
228472025-03-07T23:12:41.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228482025-03-07T23:12:41.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228492025-03-07T23:12:41.265ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228502025-03-07T23:12:41.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
228512025-03-07T23:12:41.281ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
228522025-03-07T23:12:41.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228532025-03-07T23:12:41.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228542025-03-07T23:12:41.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228552025-03-07T23:12:41.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
228562025-03-07T23:12:41.287ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
228572025-03-07T23:12:41.287ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228582025-03-07T23:12:41.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228592025-03-07T23:12:41.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228602025-03-07T23:12:41.290ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
228612025-03-07T23:12:41.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228622025-03-07T23:12:41.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228632025-03-07T23:12:41.294ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228642025-03-07T23:12:41.307ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
228652025-03-07T23:12:41.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
228662025-03-07T23:12:41.317ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228672025-03-07T23:12:41.317ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228682025-03-07T23:12:41.317ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228692025-03-07T23:12:41.318ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228702025-03-07T23:12:41.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
228712025-03-07T23:12:41.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228722025-03-07T23:12:41.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228732025-03-07T23:12:41.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228742025-03-07T23:12:41.327ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228752025-03-07T23:12:41.328ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228762025-03-07T23:12:41.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228772025-03-07T23:12:41.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228782025-03-07T23:12:41.338ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228792025-03-07T23:12:41.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228802025-03-07T23:12:41.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228812025-03-07T23:12:41.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228822025-03-07T23:12:41.351ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228832025-03-07T23:12:41.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228842025-03-07T23:12:41.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228852025-03-07T23:12:41.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228862025-03-07T23:12:41.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228872025-03-07T23:12:41.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228882025-03-07T23:12:41.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228892025-03-07T23:12:41.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228902025-03-07T23:12:41.360ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228912025-03-07T23:12:41.379ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228922025-03-07T23:12:41.379ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 131729 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c89698-73aa-4bea-bd06-13b407480577 response_code = 404 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228932025-03-07T23:12:41.380ZINFOtest_unauthorized (external client test context): client received response status = 404
228942025-03-07T23:12:41.380ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228952025-03-07T23:12:41.380ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228962025-03-07T23:12:41.383ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d80644e9-5125-4dee-a9b6-6dbc52958b3b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228972025-03-07T23:12:41.384ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d80644e9-5125-4dee-a9b6-6dbc52958b3b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228982025-03-07T23:12:41.384ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d80644e9-5125-4dee-a9b6-6dbc52958b3b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
228992025-03-07T23:12:41.384ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d80644e9-5125-4dee-a9b6-6dbc52958b3b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229002025-03-07T23:12:41.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 3445 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d80644e9-5125-4dee-a9b6-6dbc52958b3b response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229012025-03-07T23:12:41.385ZINFOtest_unauthorized (external client test context): client received response status = 401
229022025-03-07T23:12:41.385ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229032025-03-07T23:12:41.385ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229042025-03-07T23:12:41.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0365871f-9e7d-4938-930b-413f87d70dea uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229052025-03-07T23:12:41.387ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0365871f-9e7d-4938-930b-413f87d70dea uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229062025-03-07T23:12:41.387ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0365871f-9e7d-4938-930b-413f87d70dea uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229072025-03-07T23:12:41.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1228 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0365871f-9e7d-4938-930b-413f87d70dea response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229082025-03-07T23:12:41.387ZINFOtest_unauthorized (external client test context): client received response status = 401
229092025-03-07T23:12:41.388ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229102025-03-07T23:12:41.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229112025-03-07T23:12:41.388ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5a2ae128-29b8-4a45-9fd0-d02a86271885 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229122025-03-07T23:12:41.388ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5a2ae128-29b8-4a45-9fd0-d02a86271885 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229132025-03-07T23:12:41.389ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5049:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5068:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5a2ae128-29b8-4a45-9fd0-d02a86271885 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229142025-03-07T23:12:41.389ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1339 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5a2ae128-29b8-4a45-9fd0-d02a86271885 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229152025-03-07T23:12:41.390ZINFOtest_unauthorized (external client test context): client received response status = 401
229162025-03-07T23:12:41.390ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229172025-03-07T23:12:41.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229182025-03-07T23:12:41.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8cd49c0d-680e-452a-a415-7aacef08f299 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229192025-03-07T23:12:41.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8cd49c0d-680e-452a-a415-7aacef08f299 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229202025-03-07T23:12:41.390ZINFOtest_unauthorized (external client test context): client received response status = 405
229212025-03-07T23:12:41.391ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229222025-03-07T23:12:41.391ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229232025-03-07T23:12:41.391ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fe55b77b-0cbf-4cba-b265-a7cb6edadf79 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229242025-03-07T23:12:41.391ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fe55b77b-0cbf-4cba-b265-a7cb6edadf79 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229252025-03-07T23:12:41.391ZINFOtest_unauthorized (external client test context): client received response status = 405
229262025-03-07T23:12:41.392ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229272025-03-07T23:12:41.392ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229282025-03-07T23:12:41.392ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5dd5bae3-789d-4345-8494-96f45c18f739 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229292025-03-07T23:12:41.392ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 277 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5dd5bae3-789d-4345-8494-96f45c18f739 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229302025-03-07T23:12:41.392ZINFOtest_unauthorized (external client test context): client received response status = 405
229312025-03-07T23:12:41.392ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229322025-03-07T23:12:41.392ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229332025-03-07T23:12:41.393ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b838a2fd-bcc1-446f-83f0-21a8df3f1a79 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229342025-03-07T23:12:41.393ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b838a2fd-bcc1-446f-83f0-21a8df3f1a79 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229352025-03-07T23:12:41.393ZINFOtest_unauthorized (external client test context): client received response status = 405
229362025-03-07T23:12:41.393ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229372025-03-07T23:12:41.393ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229382025-03-07T23:12:41.393ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229392025-03-07T23:12:41.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229402025-03-07T23:12:41.394ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229412025-03-07T23:12:41.394ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229422025-03-07T23:12:41.394ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229432025-03-07T23:12:41.395ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229442025-03-07T23:12:41.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229452025-03-07T23:12:41.397ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229462025-03-07T23:12:41.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229472025-03-07T23:12:41.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
229482025-03-07T23:12:41.403ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
229492025-03-07T23:12:41.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229502025-03-07T23:12:41.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229512025-03-07T23:12:41.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229522025-03-07T23:12:41.405ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
229532025-03-07T23:12:41.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229542025-03-07T23:12:41.406ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229552025-03-07T23:12:41.406ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229562025-03-07T23:12:41.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
229572025-03-07T23:12:41.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
229582025-03-07T23:12:41.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229592025-03-07T23:12:41.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229602025-03-07T23:12:41.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229612025-03-07T23:12:41.417ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
229622025-03-07T23:12:41.419ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
229632025-03-07T23:12:41.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229642025-03-07T23:12:41.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229652025-03-07T23:12:41.419ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229662025-03-07T23:12:41.422ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
229672025-03-07T23:12:41.422ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229682025-03-07T23:12:41.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229692025-03-07T23:12:41.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229702025-03-07T23:12:41.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
229712025-03-07T23:12:41.428ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
229722025-03-07T23:12:41.428ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229732025-03-07T23:12:41.428ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229742025-03-07T23:12:41.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229752025-03-07T23:12:41.429ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229762025-03-07T23:12:41.431ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229772025-03-07T23:12:41.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229782025-03-07T23:12:41.432ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229792025-03-07T23:12:41.433ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229802025-03-07T23:12:41.433ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229812025-03-07T23:12:41.436ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229822025-03-07T23:12:41.436ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229832025-03-07T23:12:41.437ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229842025-03-07T23:12:41.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229852025-03-07T23:12:41.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229862025-03-07T23:12:41.437ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229872025-03-07T23:12:41.440ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229882025-03-07T23:12:41.440ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229892025-03-07T23:12:41.440ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229902025-03-07T23:12:41.441ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229912025-03-07T23:12:41.444ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229922025-03-07T23:12:41.444ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229932025-03-07T23:12:41.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229942025-03-07T23:12:41.445ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229952025-03-07T23:12:41.448ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229962025-03-07T23:12:41.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229972025-03-07T23:12:41.458ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 63830 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 04dc6de0-48e8-4bb9-85e6-08a60a6544df response_code = 404 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229982025-03-07T23:12:41.458ZINFOtest_unauthorized (external client test context): client received response status = 404
229992025-03-07T23:12:41.458ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230002025-03-07T23:12:41.458ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230012025-03-07T23:12:41.458ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e38d92c4-7fc0-4408-b20c-8ab8c50009f8 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230022025-03-07T23:12:41.458ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e38d92c4-7fc0-4408-b20c-8ab8c50009f8 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230032025-03-07T23:12:41.459ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e38d92c4-7fc0-4408-b20c-8ab8c50009f8 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230042025-03-07T23:12:41.459ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e38d92c4-7fc0-4408-b20c-8ab8c50009f8 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230052025-03-07T23:12:41.459ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 481 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e38d92c4-7fc0-4408-b20c-8ab8c50009f8 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230062025-03-07T23:12:41.459ZINFOtest_unauthorized (external client test context): client received response status = 401
230072025-03-07T23:12:41.459ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230082025-03-07T23:12:41.459ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230092025-03-07T23:12:41.459ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6f420523-2fb5-4865-95b8-3c15e45e105e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230102025-03-07T23:12:41.459ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6f420523-2fb5-4865-95b8-3c15e45e105e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230112025-03-07T23:12:41.459ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6f420523-2fb5-4865-95b8-3c15e45e105e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230122025-03-07T23:12:41.460ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 310 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6f420523-2fb5-4865-95b8-3c15e45e105e response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230132025-03-07T23:12:41.460ZINFOtest_unauthorized (external client test context): client received response status = 401
230142025-03-07T23:12:41.460ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230152025-03-07T23:12:41.460ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230162025-03-07T23:12:41.460ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28acfe9c-b4fe-4c52-9777-6cf98426f0ab uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230172025-03-07T23:12:41.461ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28acfe9c-b4fe-4c52-9777-6cf98426f0ab uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230182025-03-07T23:12:41.461ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5082:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5092:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28acfe9c-b4fe-4c52-9777-6cf98426f0ab uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230192025-03-07T23:12:41.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 911 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 28acfe9c-b4fe-4c52-9777-6cf98426f0ab response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230202025-03-07T23:12:41.461ZINFOtest_unauthorized (external client test context): client received response status = 401
230212025-03-07T23:12:41.461ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230222025-03-07T23:12:41.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230232025-03-07T23:12:41.462ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3630be9c-cad1-4789-97e7-35a016efc905 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230242025-03-07T23:12:41.462ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3630be9c-cad1-4789-97e7-35a016efc905 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230252025-03-07T23:12:41.462ZINFOtest_unauthorized (external client test context): client received response status = 405
230262025-03-07T23:12:41.462ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230272025-03-07T23:12:41.462ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230282025-03-07T23:12:41.462ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c88b5ce3-80a4-45f0-9ada-ec04775082b4 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230292025-03-07T23:12:41.462ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c88b5ce3-80a4-45f0-9ada-ec04775082b4 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230302025-03-07T23:12:41.462ZINFOtest_unauthorized (external client test context): client received response status = 405
230312025-03-07T23:12:41.463ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230322025-03-07T23:12:41.463ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230332025-03-07T23:12:41.463ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 62016ee9-758e-4b85-a164-f57ffc907a3d uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230342025-03-07T23:12:41.463ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 62016ee9-758e-4b85-a164-f57ffc907a3d response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230352025-03-07T23:12:41.463ZINFOtest_unauthorized (external client test context): client received response status = 405
230362025-03-07T23:12:41.463ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230372025-03-07T23:12:41.463ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230382025-03-07T23:12:41.464ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bcdaf138-e824-4d76-a1a9-f52aefa3fb74 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230392025-03-07T23:12:41.464ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bcdaf138-e824-4d76-a1a9-f52aefa3fb74 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230402025-03-07T23:12:41.464ZINFOtest_unauthorized (external client test context): client received response status = 405
230412025-03-07T23:12:41.464ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230422025-03-07T23:12:41.464ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230432025-03-07T23:12:41.464ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 15b5df41-5c1a-4669-ad28-7013d954c6d9 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230442025-03-07T23:12:41.464ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 15b5df41-5c1a-4669-ad28-7013d954c6d9 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230452025-03-07T23:12:41.465ZINFOtest_unauthorized (external client test context): client received response status = 405
230462025-03-07T23:12:41.465ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230472025-03-07T23:12:41.465ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230482025-03-07T23:12:41.465ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ad0b3d8c-233e-4551-b9e4-994135e19d91 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230492025-03-07T23:12:41.465ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ad0b3d8c-233e-4551-b9e4-994135e19d91 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230502025-03-07T23:12:41.465ZINFOtest_unauthorized (external client test context): client received response status = 405
230512025-03-07T23:12:41.465ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230522025-03-07T23:12:41.465ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230532025-03-07T23:12:41.465ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 79ca7dd3-c4cb-4de5-9931-be5f5f49370f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230542025-03-07T23:12:41.465ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 79ca7dd3-c4cb-4de5-9931-be5f5f49370f response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230552025-03-07T23:12:41.465ZINFOtest_unauthorized (external client test context): client received response status = 405
230562025-03-07T23:12:41.465ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230572025-03-07T23:12:41.466ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230582025-03-07T23:12:41.466ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 97c52eb1-3092-4c8b-9033-9464b8ee0e33 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230592025-03-07T23:12:41.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 97c52eb1-3092-4c8b-9033-9464b8ee0e33 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230602025-03-07T23:12:41.466ZINFOtest_unauthorized (external client test context): client received response status = 405
230612025-03-07T23:12:41.467ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230622025-03-07T23:12:41.467ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230632025-03-07T23:12:41.467ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230642025-03-07T23:12:41.467ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230652025-03-07T23:12:41.467ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230662025-03-07T23:12:41.467ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230672025-03-07T23:12:41.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230682025-03-07T23:12:41.467ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230692025-03-07T23:12:41.469ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230702025-03-07T23:12:41.469ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230712025-03-07T23:12:41.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230722025-03-07T23:12:41.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
230732025-03-07T23:12:41.473ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
230742025-03-07T23:12:41.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230752025-03-07T23:12:41.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230762025-03-07T23:12:41.473ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230772025-03-07T23:12:41.474ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
230782025-03-07T23:12:41.474ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230792025-03-07T23:12:41.474ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230802025-03-07T23:12:41.475ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230812025-03-07T23:12:41.477ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
230822025-03-07T23:12:41.481ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
230832025-03-07T23:12:41.482ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230842025-03-07T23:12:41.482ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230852025-03-07T23:12:41.482ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230862025-03-07T23:12:41.484ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
230872025-03-07T23:12:41.484ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
230882025-03-07T23:12:41.484ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230892025-03-07T23:12:41.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230902025-03-07T23:12:41.485ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230912025-03-07T23:12:41.490ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
230922025-03-07T23:12:41.490ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230932025-03-07T23:12:41.490ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230942025-03-07T23:12:41.493ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230952025-03-07T23:12:41.494ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
230962025-03-07T23:12:41.494ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
230972025-03-07T23:12:41.494ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230982025-03-07T23:12:41.494ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230992025-03-07T23:12:41.494ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231002025-03-07T23:12:41.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231012025-03-07T23:12:41.496ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231022025-03-07T23:12:41.497ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231032025-03-07T23:12:41.497ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231042025-03-07T23:12:41.499ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231052025-03-07T23:12:41.500ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231062025-03-07T23:12:41.500ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231072025-03-07T23:12:41.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231082025-03-07T23:12:41.502ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231092025-03-07T23:12:41.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231102025-03-07T23:12:41.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231112025-03-07T23:12:41.502ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231122025-03-07T23:12:41.505ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231132025-03-07T23:12:41.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231142025-03-07T23:12:41.507ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231152025-03-07T23:12:41.507ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231162025-03-07T23:12:41.511ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231172025-03-07T23:12:41.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231182025-03-07T23:12:41.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231192025-03-07T23:12:41.511ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231202025-03-07T23:12:41.514ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231212025-03-07T23:12:41.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231222025-03-07T23:12:41.522ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231232025-03-07T23:12:41.523ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231242025-03-07T23:12:41.523ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231252025-03-07T23:12:41.523ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231262025-03-07T23:12:41.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231272025-03-07T23:12:41.526ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231282025-03-07T23:12:41.526ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231292025-03-07T23:12:41.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231302025-03-07T23:12:41.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231312025-03-07T23:12:41.530ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231322025-03-07T23:12:41.530ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231332025-03-07T23:12:41.530ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231342025-03-07T23:12:41.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231352025-03-07T23:12:41.534ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231362025-03-07T23:12:41.545ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231372025-03-07T23:12:41.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231382025-03-07T23:12:41.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231392025-03-07T23:12:41.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231402025-03-07T23:12:41.551ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 85103 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 550c6c90-1bd4-47c2-9bfb-16d63de5476b response_code = 200 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231412025-03-07T23:12:41.552ZINFOtest_unauthorized (external client test context): client received response status = 200
231422025-03-07T23:12:41.554ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231432025-03-07T23:12:41.554ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231442025-03-07T23:12:41.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231452025-03-07T23:12:41.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231462025-03-07T23:12:41.554ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231472025-03-07T23:12:41.554ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231482025-03-07T23:12:41.554ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231492025-03-07T23:12:41.554ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231502025-03-07T23:12:41.555ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231512025-03-07T23:12:41.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231522025-03-07T23:12:41.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231532025-03-07T23:12:41.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231542025-03-07T23:12:41.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
231552025-03-07T23:12:41.562ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
231562025-03-07T23:12:41.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231572025-03-07T23:12:41.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231582025-03-07T23:12:41.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231592025-03-07T23:12:41.564ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
231602025-03-07T23:12:41.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231612025-03-07T23:12:41.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231622025-03-07T23:12:41.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231632025-03-07T23:12:41.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
231642025-03-07T23:12:41.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
231652025-03-07T23:12:41.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231662025-03-07T23:12:41.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231672025-03-07T23:12:41.573ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231682025-03-07T23:12:41.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
231692025-03-07T23:12:41.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231702025-03-07T23:12:41.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
231712025-03-07T23:12:41.575ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
231722025-03-07T23:12:41.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231732025-03-07T23:12:41.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231742025-03-07T23:12:41.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231752025-03-07T23:12:41.577ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 96aef1ab-bfc2-4887-b90e-c3e011d038d1 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231762025-03-07T23:12:41.577ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 96aef1ab-bfc2-4887-b90e-c3e011d038d1 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231772025-03-07T23:12:41.577ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 96aef1ab-bfc2-4887-b90e-c3e011d038d1 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231782025-03-07T23:12:41.578ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 96aef1ab-bfc2-4887-b90e-c3e011d038d1 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231792025-03-07T23:12:41.580ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
231802025-03-07T23:12:41.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231812025-03-07T23:12:41.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231822025-03-07T23:12:41.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231832025-03-07T23:12:41.582ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5340 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 96aef1ab-bfc2-4887-b90e-c3e011d038d1 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
231842025-03-07T23:12:41.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
231852025-03-07T23:12:41.588ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
231862025-03-07T23:12:41.589ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231872025-03-07T23:12:41.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231882025-03-07T23:12:41.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231892025-03-07T23:12:41.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231902025-03-07T23:12:41.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
231912025-03-07T23:12:41.592ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "96aef1ab-bfc2-4887-b90e-c3e011d038d1", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:41 GMT"} })
231922025-03-07T23:12:41.592ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
231932025-03-07T23:12:41.592ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
231942025-03-07T23:12:41.593ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 49abd4e2-5c4f-4310-b88b-1fe1aff8f275 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
231952025-03-07T23:12:41.593ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 49abd4e2-5c4f-4310-b88b-1fe1aff8f275 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
231962025-03-07T23:12:41.593ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 49abd4e2-5c4f-4310-b88b-1fe1aff8f275 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
231972025-03-07T23:12:41.594ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 49abd4e2-5c4f-4310-b88b-1fe1aff8f275 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
231982025-03-07T23:12:41.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
231992025-03-07T23:12:41.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232002025-03-07T23:12:41.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232012025-03-07T23:12:41.598ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
232022025-03-07T23:12:41.599ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
232032025-03-07T23:12:41.599ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
232042025-03-07T23:12:41.600ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
232052025-03-07T23:12:41.600ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6794 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 49abd4e2-5c4f-4310-b88b-1fe1aff8f275 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
232062025-03-07T23:12:41.600ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "49abd4e2-5c4f-4310-b88b-1fe1aff8f275", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:41 GMT"} })
232072025-03-07T23:12:41.600ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
232082025-03-07T23:12:41.600ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
232092025-03-07T23:12:41.600ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
232102025-03-07T23:12:41.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232112025-03-07T23:12:41.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232122025-03-07T23:12:41.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232132025-03-07T23:12:41.605ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232142025-03-07T23:12:41.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232152025-03-07T23:12:41.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232162025-03-07T23:12:41.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232172025-03-07T23:12:41.608ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232182025-03-07T23:12:41.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232192025-03-07T23:12:41.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232202025-03-07T23:12:41.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232212025-03-07T23:12:41.611ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232222025-03-07T23:12:41.611ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232232025-03-07T23:12:41.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232242025-03-07T23:12:41.612ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232252025-03-07T23:12:41.615ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232262025-03-07T23:12:41.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232272025-03-07T23:12:41.617ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232282025-03-07T23:12:41.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232292025-03-07T23:12:41.619ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232302025-03-07T23:12:41.629ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232312025-03-07T23:12:41.629ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 76195 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17e17861-bc20-4381-a9f7-9aae26c81b47 response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232322025-03-07T23:12:41.630ZINFOtest_unauthorized (external client test context): client received response status = 200
232332025-03-07T23:12:41.631ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232342025-03-07T23:12:41.631ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232352025-03-07T23:12:41.631ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232362025-03-07T23:12:41.631ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232372025-03-07T23:12:41.631ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232382025-03-07T23:12:41.631ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232392025-03-07T23:12:41.631ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232402025-03-07T23:12:41.632ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232412025-03-07T23:12:41.634ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232422025-03-07T23:12:41.636ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232432025-03-07T23:12:41.636ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232442025-03-07T23:12:41.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
232452025-03-07T23:12:41.638ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
232462025-03-07T23:12:41.638ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232472025-03-07T23:12:41.638ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232482025-03-07T23:12:41.639ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232492025-03-07T23:12:41.641ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
232502025-03-07T23:12:41.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232512025-03-07T23:12:41.644ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232522025-03-07T23:12:41.644ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232532025-03-07T23:12:41.644ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
232542025-03-07T23:12:41.648ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
232552025-03-07T23:12:41.648ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232562025-03-07T23:12:41.648ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232572025-03-07T23:12:41.649ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232582025-03-07T23:12:41.651ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
232592025-03-07T23:12:41.652ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
232602025-03-07T23:12:41.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232612025-03-07T23:12:41.652ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232622025-03-07T23:12:41.652ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232632025-03-07T23:12:41.655ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
232642025-03-07T23:12:41.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232652025-03-07T23:12:41.655ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232662025-03-07T23:12:41.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232672025-03-07T23:12:41.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
232682025-03-07T23:12:41.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
232692025-03-07T23:12:41.675ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232702025-03-07T23:12:41.676ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232712025-03-07T23:12:41.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232722025-03-07T23:12:41.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232732025-03-07T23:12:41.677ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232742025-03-07T23:12:41.677ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232752025-03-07T23:12:41.677ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232762025-03-07T23:12:41.677ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232772025-03-07T23:12:41.677ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232782025-03-07T23:12:41.677ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232792025-03-07T23:12:41.677ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
232802025-03-07T23:12:41.677ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
232812025-03-07T23:12:41.677ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
232822025-03-07T23:12:41.677ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
232832025-03-07T23:12:41.677ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
232842025-03-07T23:12:41.680ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
232852025-03-07T23:12:41.680ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232862025-03-07T23:12:41.680ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232872025-03-07T23:12:41.680ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232882025-03-07T23:12:41.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232892025-03-07T23:12:41.685ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232902025-03-07T23:12:41.685ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232912025-03-07T23:12:41.685ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232922025-03-07T23:12:41.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232932025-03-07T23:12:41.690ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232942025-03-07T23:12:41.692ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232952025-03-07T23:12:41.693ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232962025-03-07T23:12:41.694ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232972025-03-07T23:12:41.694ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232982025-03-07T23:12:41.694ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
232992025-03-07T23:12:41.694ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233002025-03-07T23:12:41.697ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233012025-03-07T23:12:41.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233022025-03-07T23:12:41.711ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233032025-03-07T23:12:41.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 81132 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 101ce6c6-b006-4ea7-aa80-b5178d336c66 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233042025-03-07T23:12:41.715ZINFOtest_unauthorized (external client test context): client received response status = 404
233052025-03-07T23:12:41.715ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233062025-03-07T23:12:41.715ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233072025-03-07T23:12:41.715ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc40674c-7e8a-472c-9993-f5c67e8c4162 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233082025-03-07T23:12:41.715ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc40674c-7e8a-472c-9993-f5c67e8c4162 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233092025-03-07T23:12:41.715ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc40674c-7e8a-472c-9993-f5c67e8c4162 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233102025-03-07T23:12:41.715ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc40674c-7e8a-472c-9993-f5c67e8c4162 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233112025-03-07T23:12:41.715ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 342 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc40674c-7e8a-472c-9993-f5c67e8c4162 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233122025-03-07T23:12:41.716ZINFOtest_unauthorized (external client test context): client received response status = 401
233132025-03-07T23:12:41.716ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233142025-03-07T23:12:41.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233152025-03-07T23:12:41.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6479f652-1867-4c47-8ecf-30c44618f36d uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233162025-03-07T23:12:41.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6479f652-1867-4c47-8ecf-30c44618f36d uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233172025-03-07T23:12:41.716ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6479f652-1867-4c47-8ecf-30c44618f36d uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233182025-03-07T23:12:41.716ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 166 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6479f652-1867-4c47-8ecf-30c44618f36d response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233192025-03-07T23:12:41.716ZINFOtest_unauthorized (external client test context): client received response status = 401
233202025-03-07T23:12:41.716ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233212025-03-07T23:12:41.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233222025-03-07T23:12:41.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82824244-4faf-4277-89f1-9188c9f1e8f4 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233232025-03-07T23:12:41.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82824244-4faf-4277-89f1-9188c9f1e8f4 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233242025-03-07T23:12:41.717ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5106:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5122:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82824244-4faf-4277-89f1-9188c9f1e8f4 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233252025-03-07T23:12:41.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1004 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82824244-4faf-4277-89f1-9188c9f1e8f4 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233262025-03-07T23:12:41.717ZINFOtest_unauthorized (external client test context): client received response status = 401
233272025-03-07T23:12:41.717ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233282025-03-07T23:12:41.718ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233292025-03-07T23:12:41.719ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233302025-03-07T23:12:41.719ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233312025-03-07T23:12:41.719ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233322025-03-07T23:12:41.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233332025-03-07T23:12:41.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233342025-03-07T23:12:41.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233352025-03-07T23:12:41.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233362025-03-07T23:12:41.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233372025-03-07T23:12:41.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233382025-03-07T23:12:41.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
233392025-03-07T23:12:41.723ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
233402025-03-07T23:12:41.723ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233412025-03-07T23:12:41.723ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233422025-03-07T23:12:41.723ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233432025-03-07T23:12:41.724ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
233442025-03-07T23:12:41.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233452025-03-07T23:12:41.724ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233462025-03-07T23:12:41.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233472025-03-07T23:12:41.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
233482025-03-07T23:12:41.731ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
233492025-03-07T23:12:41.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233502025-03-07T23:12:41.731ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233512025-03-07T23:12:41.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233522025-03-07T23:12:41.735ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
233532025-03-07T23:12:41.736ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
233542025-03-07T23:12:41.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233552025-03-07T23:12:41.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233562025-03-07T23:12:41.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233572025-03-07T23:12:41.738ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
233582025-03-07T23:12:41.738ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233592025-03-07T23:12:41.738ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233602025-03-07T23:12:41.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233612025-03-07T23:12:41.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
233622025-03-07T23:12:41.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
233632025-03-07T23:12:41.745ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233642025-03-07T23:12:41.745ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233652025-03-07T23:12:41.745ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233662025-03-07T23:12:41.746ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233672025-03-07T23:12:41.749ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233682025-03-07T23:12:41.749ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233692025-03-07T23:12:41.750ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233702025-03-07T23:12:41.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233712025-03-07T23:12:41.752ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233722025-03-07T23:12:41.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233732025-03-07T23:12:41.755ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233742025-03-07T23:12:41.755ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233752025-03-07T23:12:41.756ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233762025-03-07T23:12:41.759ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
233772025-03-07T23:12:41.765ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
233782025-03-07T23:12:41.766ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
233792025-03-07T23:12:41.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233802025-03-07T23:12:41.766ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233812025-03-07T23:12:41.767ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233822025-03-07T23:12:41.767ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233832025-03-07T23:12:41.767ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233842025-03-07T23:12:41.768ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233852025-03-07T23:12:41.769ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233862025-03-07T23:12:41.769ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233872025-03-07T23:12:41.769ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233882025-03-07T23:12:41.773ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233892025-03-07T23:12:41.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233902025-03-07T23:12:41.774ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233912025-03-07T23:12:41.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233922025-03-07T23:12:41.780ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233932025-03-07T23:12:41.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233942025-03-07T23:12:41.797ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 81786 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec1184bb-1241-410f-92e1-58b5c34e16c8 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233952025-03-07T23:12:41.801ZINFOtest_unauthorized (external client test context): client received response status = 404
233962025-03-07T23:12:41.802ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233972025-03-07T23:12:41.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233982025-03-07T23:12:41.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 69204f12-209f-45e8-a513-b5cde0617d64 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233992025-03-07T23:12:41.805ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 69204f12-209f-45e8-a513-b5cde0617d64 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234002025-03-07T23:12:41.805ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 69204f12-209f-45e8-a513-b5cde0617d64 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234012025-03-07T23:12:41.805ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 69204f12-209f-45e8-a513-b5cde0617d64 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234022025-03-07T23:12:41.806ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 3819 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 69204f12-209f-45e8-a513-b5cde0617d64 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234032025-03-07T23:12:41.807ZINFOtest_unauthorized (external client test context): client received response status = 401
234042025-03-07T23:12:41.808ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234052025-03-07T23:12:41.808ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234062025-03-07T23:12:41.815ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5aba9ea-1768-4849-b068-76b8770c2e3f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234072025-03-07T23:12:41.815ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5aba9ea-1768-4849-b068-76b8770c2e3f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234082025-03-07T23:12:41.815ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5aba9ea-1768-4849-b068-76b8770c2e3f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234092025-03-07T23:12:41.815ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 831 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5aba9ea-1768-4849-b068-76b8770c2e3f response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234102025-03-07T23:12:41.821ZINFOtest_unauthorized (external client test context): client received response status = 401
234112025-03-07T23:12:41.821ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234122025-03-07T23:12:41.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234132025-03-07T23:12:41.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4de5ddb5-594f-45a6-a88d-f7099a654813 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234142025-03-07T23:12:41.821ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4de5ddb5-594f-45a6-a88d-f7099a654813 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234152025-03-07T23:12:41.822ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5167:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5184:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4de5ddb5-594f-45a6-a88d-f7099a654813 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234162025-03-07T23:12:41.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1282 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4de5ddb5-594f-45a6-a88d-f7099a654813 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234172025-03-07T23:12:41.822ZINFOtest_unauthorized (external client test context): client received response status = 401
234182025-03-07T23:12:41.823ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234192025-03-07T23:12:41.823ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234202025-03-07T23:12:41.823ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f10dee09-be26-4f9c-a239-e830ded3a794 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234212025-03-07T23:12:41.823ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 96 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f10dee09-be26-4f9c-a239-e830ded3a794 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234222025-03-07T23:12:41.823ZINFOtest_unauthorized (external client test context): client received response status = 405
234232025-03-07T23:12:41.823ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234242025-03-07T23:12:41.823ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234252025-03-07T23:12:41.823ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 709ee5cf-c31e-4452-ba7c-a38e0d79b13b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234262025-03-07T23:12:41.823ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 709ee5cf-c31e-4452-ba7c-a38e0d79b13b response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234272025-03-07T23:12:41.824ZINFOtest_unauthorized (external client test context): client received response status = 405
234282025-03-07T23:12:41.824ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234292025-03-07T23:12:41.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234302025-03-07T23:12:41.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f782126c-0999-4af4-aa65-34eb1aa6e8ef uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234312025-03-07T23:12:41.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f782126c-0999-4af4-aa65-34eb1aa6e8ef response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234322025-03-07T23:12:41.824ZINFOtest_unauthorized (external client test context): client received response status = 405
234332025-03-07T23:12:41.824ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234342025-03-07T23:12:41.825ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234352025-03-07T23:12:41.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 461a70ca-7893-41db-b813-1761e70bfd30 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234362025-03-07T23:12:41.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 461a70ca-7893-41db-b813-1761e70bfd30 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234372025-03-07T23:12:41.827ZINFOtest_unauthorized (external client test context): client received response status = 405
234382025-03-07T23:12:41.827ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234392025-03-07T23:12:41.827ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234402025-03-07T23:12:41.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234412025-03-07T23:12:41.827ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234422025-03-07T23:12:41.827ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234432025-03-07T23:12:41.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234442025-03-07T23:12:41.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234452025-03-07T23:12:41.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234462025-03-07T23:12:41.829ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234472025-03-07T23:12:41.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234482025-03-07T23:12:41.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234492025-03-07T23:12:41.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
234502025-03-07T23:12:41.833ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234512025-03-07T23:12:41.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234522025-03-07T23:12:41.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234532025-03-07T23:12:41.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234542025-03-07T23:12:41.835ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234552025-03-07T23:12:41.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234562025-03-07T23:12:41.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234572025-03-07T23:12:41.836ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234582025-03-07T23:12:41.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234592025-03-07T23:12:41.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
234602025-03-07T23:12:41.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234612025-03-07T23:12:41.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234622025-03-07T23:12:41.842ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234632025-03-07T23:12:41.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
234642025-03-07T23:12:41.844ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234652025-03-07T23:12:41.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234662025-03-07T23:12:41.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234672025-03-07T23:12:41.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234682025-03-07T23:12:41.847ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234692025-03-07T23:12:41.847ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234702025-03-07T23:12:41.847ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234712025-03-07T23:12:41.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234722025-03-07T23:12:41.850ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234732025-03-07T23:12:41.853ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
234742025-03-07T23:12:41.853ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234752025-03-07T23:12:41.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234762025-03-07T23:12:41.853ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234772025-03-07T23:12:41.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234782025-03-07T23:12:41.857ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234792025-03-07T23:12:41.858ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234802025-03-07T23:12:41.858ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234812025-03-07T23:12:41.860ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234822025-03-07T23:12:41.860ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234832025-03-07T23:12:41.861ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234842025-03-07T23:12:41.863ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234852025-03-07T23:12:41.863ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234862025-03-07T23:12:41.864ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234872025-03-07T23:12:41.866ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234882025-03-07T23:12:41.867ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234892025-03-07T23:12:41.867ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234902025-03-07T23:12:41.867ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234912025-03-07T23:12:41.867ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234922025-03-07T23:12:41.869ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234932025-03-07T23:12:41.869ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234942025-03-07T23:12:41.869ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234952025-03-07T23:12:41.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234962025-03-07T23:12:41.872ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234972025-03-07T23:12:41.873ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234982025-03-07T23:12:41.874ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234992025-03-07T23:12:41.874ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235002025-03-07T23:12:41.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235012025-03-07T23:12:41.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235022025-03-07T23:12:41.907ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 81569 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d989867b-3788-4d17-8dda-8a2437369a4a response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235032025-03-07T23:12:41.907ZINFOtest_unauthorized (external client test context): client received response status = 404
235042025-03-07T23:12:41.908ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235052025-03-07T23:12:41.908ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235062025-03-07T23:12:41.908ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5aedb954-a91e-4910-9e50-20bf070715f5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235072025-03-07T23:12:41.909ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5aedb954-a91e-4910-9e50-20bf070715f5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235082025-03-07T23:12:41.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5aedb954-a91e-4910-9e50-20bf070715f5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235092025-03-07T23:12:41.910ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5aedb954-a91e-4910-9e50-20bf070715f5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235102025-03-07T23:12:41.910ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 619 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5aedb954-a91e-4910-9e50-20bf070715f5 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235112025-03-07T23:12:41.910ZINFOtest_unauthorized (external client test context): client received response status = 401
235122025-03-07T23:12:41.910ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235132025-03-07T23:12:41.910ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235142025-03-07T23:12:41.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9709a804-cdd1-4276-b5c6-b2f4fad6b95f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235152025-03-07T23:12:41.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9709a804-cdd1-4276-b5c6-b2f4fad6b95f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235162025-03-07T23:12:41.910ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9709a804-cdd1-4276-b5c6-b2f4fad6b95f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235172025-03-07T23:12:41.910ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 217 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9709a804-cdd1-4276-b5c6-b2f4fad6b95f response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235182025-03-07T23:12:41.910ZINFOtest_unauthorized (external client test context): client received response status = 401
235192025-03-07T23:12:41.910ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235202025-03-07T23:12:41.911ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235212025-03-07T23:12:41.911ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 279fa60e-3249-4ae2-9d6a-5572998ed876 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235222025-03-07T23:12:41.911ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 279fa60e-3249-4ae2-9d6a-5572998ed876 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235232025-03-07T23:12:41.911ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5136:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5151:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 279fa60e-3249-4ae2-9d6a-5572998ed876 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235242025-03-07T23:12:41.911ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 972 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 279fa60e-3249-4ae2-9d6a-5572998ed876 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235252025-03-07T23:12:41.912ZINFOtest_unauthorized (external client test context): client received response status = 401
235262025-03-07T23:12:41.913ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235272025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235282025-03-07T23:12:41.914ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 430a8a7b-b04b-4e7c-a435-a79cfd04ce5b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235292025-03-07T23:12:41.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 430a8a7b-b04b-4e7c-a435-a79cfd04ce5b response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235302025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client received response status = 405
235312025-03-07T23:12:41.914ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235322025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235332025-03-07T23:12:41.914ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = de026249-e49f-4e74-93a3-c34a828b122f uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235342025-03-07T23:12:41.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = de026249-e49f-4e74-93a3-c34a828b122f response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235352025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client received response status = 405
235362025-03-07T23:12:41.914ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235372025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235382025-03-07T23:12:41.914ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f2591148-fc73-4700-96a5-6b6779427d1d uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235392025-03-07T23:12:41.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f2591148-fc73-4700-96a5-6b6779427d1d response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235402025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client received response status = 405
235412025-03-07T23:12:41.914ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235422025-03-07T23:12:41.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235432025-03-07T23:12:41.914ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b0cf7884-58b0-480f-a933-2be662256a9b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235442025-03-07T23:12:41.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b0cf7884-58b0-480f-a933-2be662256a9b response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235452025-03-07T23:12:41.915ZINFOtest_unauthorized (external client test context): client received response status = 405
235462025-03-07T23:12:41.915ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235472025-03-07T23:12:41.916ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235482025-03-07T23:12:41.916ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235492025-03-07T23:12:41.916ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235502025-03-07T23:12:41.916ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235512025-03-07T23:12:41.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235522025-03-07T23:12:41.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235532025-03-07T23:12:41.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235542025-03-07T23:12:41.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235552025-03-07T23:12:41.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235562025-03-07T23:12:41.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235572025-03-07T23:12:41.923ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
235582025-03-07T23:12:41.925ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
235592025-03-07T23:12:41.925ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235602025-03-07T23:12:41.925ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235612025-03-07T23:12:41.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235622025-03-07T23:12:41.928ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
235632025-03-07T23:12:41.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235642025-03-07T23:12:41.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235652025-03-07T23:12:41.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235662025-03-07T23:12:41.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
235672025-03-07T23:12:41.936ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
235682025-03-07T23:12:41.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235692025-03-07T23:12:41.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235702025-03-07T23:12:41.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235712025-03-07T23:12:41.938ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
235722025-03-07T23:12:41.939ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
235732025-03-07T23:12:41.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235742025-03-07T23:12:41.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235752025-03-07T23:12:41.939ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235762025-03-07T23:12:41.941ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
235772025-03-07T23:12:41.942ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235782025-03-07T23:12:41.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235792025-03-07T23:12:41.942ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235802025-03-07T23:12:41.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
235812025-03-07T23:12:41.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
235822025-03-07T23:12:41.951ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235832025-03-07T23:12:41.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235842025-03-07T23:12:41.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235852025-03-07T23:12:41.952ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235862025-03-07T23:12:41.954ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235872025-03-07T23:12:41.954ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235882025-03-07T23:12:41.955ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235892025-03-07T23:12:41.956ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235902025-03-07T23:12:41.957ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235912025-03-07T23:12:41.957ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235922025-03-07T23:12:41.959ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235932025-03-07T23:12:41.959ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235942025-03-07T23:12:41.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235952025-03-07T23:12:41.962ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235962025-03-07T23:12:41.962ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235972025-03-07T23:12:41.962ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235982025-03-07T23:12:41.962ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235992025-03-07T23:12:41.963ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236002025-03-07T23:12:41.966ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236012025-03-07T23:12:41.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236022025-03-07T23:12:41.966ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236032025-03-07T23:12:41.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236042025-03-07T23:12:41.970ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236052025-03-07T23:12:41.970ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236062025-03-07T23:12:41.970ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236072025-03-07T23:12:41.971ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236082025-03-07T23:12:41.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236092025-03-07T23:12:41.983ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236102025-03-07T23:12:41.986ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 69585 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1b68a5e2-4f03-4084-8e4d-a4756b80047e response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236112025-03-07T23:12:41.986ZINFOtest_unauthorized (external client test context): client received response status = 200
236122025-03-07T23:12:41.986ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236132025-03-07T23:12:41.986ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236142025-03-07T23:12:41.986ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236152025-03-07T23:12:41.986ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236162025-03-07T23:12:41.986ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236172025-03-07T23:12:41.986ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236182025-03-07T23:12:41.986ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236192025-03-07T23:12:41.986ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236202025-03-07T23:12:41.986ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236212025-03-07T23:12:41.989ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236222025-03-07T23:12:41.989ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236232025-03-07T23:12:41.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236242025-03-07T23:12:41.992ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
236252025-03-07T23:12:41.992ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
236262025-03-07T23:12:41.992ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236272025-03-07T23:12:41.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236282025-03-07T23:12:41.993ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236292025-03-07T23:12:41.994ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
236302025-03-07T23:12:41.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236312025-03-07T23:12:41.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236322025-03-07T23:12:41.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236332025-03-07T23:12:41.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
236342025-03-07T23:12:42.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
236352025-03-07T23:12:42.002ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236362025-03-07T23:12:42.002ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236372025-03-07T23:12:42.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236382025-03-07T23:12:42.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
236392025-03-07T23:12:42.005ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
236402025-03-07T23:12:42.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236412025-03-07T23:12:42.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236422025-03-07T23:12:42.006ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236432025-03-07T23:12:42.009ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
236442025-03-07T23:12:42.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236452025-03-07T23:12:42.009ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236462025-03-07T23:12:42.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236472025-03-07T23:12:42.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
236482025-03-07T23:12:42.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
236492025-03-07T23:12:42.020ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236502025-03-07T23:12:42.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236512025-03-07T23:12:42.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236522025-03-07T23:12:42.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236532025-03-07T23:12:42.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236542025-03-07T23:12:42.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236552025-03-07T23:12:42.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236562025-03-07T23:12:42.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236572025-03-07T23:12:42.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236582025-03-07T23:12:42.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236592025-03-07T23:12:42.032ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236602025-03-07T23:12:42.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236612025-03-07T23:12:42.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236622025-03-07T23:12:42.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236632025-03-07T23:12:42.035ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236642025-03-07T23:12:42.035ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236652025-03-07T23:12:42.035ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236662025-03-07T23:12:42.036ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236672025-03-07T23:12:42.039ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236682025-03-07T23:12:42.039ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236692025-03-07T23:12:42.039ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236702025-03-07T23:12:42.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236712025-03-07T23:12:42.042ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236722025-03-07T23:12:42.043ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236732025-03-07T23:12:42.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236742025-03-07T23:12:42.044ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236752025-03-07T23:12:42.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236762025-03-07T23:12:42.076ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236772025-03-07T23:12:42.076ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236782025-03-07T23:12:42.077ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236792025-03-07T23:12:42.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236802025-03-07T23:12:42.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236812025-03-07T23:12:42.078ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236822025-03-07T23:12:42.082ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236832025-03-07T23:12:42.082ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236842025-03-07T23:12:42.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236852025-03-07T23:12:42.083ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236862025-03-07T23:12:42.086ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236872025-03-07T23:12:42.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236882025-03-07T23:12:42.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236892025-03-07T23:12:42.096ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236902025-03-07T23:12:42.101ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236912025-03-07T23:12:42.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236922025-03-07T23:12:42.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236932025-03-07T23:12:42.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236942025-03-07T23:12:42.112ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236952025-03-07T23:12:42.117ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 132745 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = eeb055fc-c3e2-471c-be57-568777632297 response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236962025-03-07T23:12:42.119ZINFOtest_unauthorized (external client test context): client received response status = 200
236972025-03-07T23:12:42.122ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236982025-03-07T23:12:42.122ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
236992025-03-07T23:12:42.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237002025-03-07T23:12:42.123ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237012025-03-07T23:12:42.124ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237022025-03-07T23:12:42.124ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237032025-03-07T23:12:42.124ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237042025-03-07T23:12:42.124ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237052025-03-07T23:12:42.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237062025-03-07T23:12:42.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237072025-03-07T23:12:42.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237082025-03-07T23:12:42.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
237092025-03-07T23:12:42.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
237102025-03-07T23:12:42.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237112025-03-07T23:12:42.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237122025-03-07T23:12:42.142ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237132025-03-07T23:12:42.144ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
237142025-03-07T23:12:42.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237152025-03-07T23:12:42.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237162025-03-07T23:12:42.145ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237172025-03-07T23:12:42.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
237182025-03-07T23:12:42.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
237192025-03-07T23:12:42.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237202025-03-07T23:12:42.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237212025-03-07T23:12:42.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237222025-03-07T23:12:42.170ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
237232025-03-07T23:12:42.170ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
237242025-03-07T23:12:42.170ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237252025-03-07T23:12:42.171ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237262025-03-07T23:12:42.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237272025-03-07T23:12:42.175ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
237282025-03-07T23:12:42.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237292025-03-07T23:12:42.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237302025-03-07T23:12:42.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237312025-03-07T23:12:42.179ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
237322025-03-07T23:12:42.222ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
237332025-03-07T23:12:42.223ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237342025-03-07T23:12:42.223ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237352025-03-07T23:12:42.223ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237362025-03-07T23:12:42.224ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237372025-03-07T23:12:42.225ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
237382025-03-07T23:12:42.226ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
237392025-03-07T23:12:42.226ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
237402025-03-07T23:12:42.230ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
237412025-03-07T23:12:42.232ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237422025-03-07T23:12:42.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237432025-03-07T23:12:42.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237442025-03-07T23:12:42.239ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237452025-03-07T23:12:42.241ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237462025-03-07T23:12:42.241ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237472025-03-07T23:12:42.242ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
237482025-03-07T23:12:42.243ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
237492025-03-07T23:12:42.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237502025-03-07T23:12:42.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237512025-03-07T23:12:42.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237522025-03-07T23:12:42.284ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
237532025-03-07T23:12:42.290ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
237542025-03-07T23:12:42.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237552025-03-07T23:12:42.290ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237562025-03-07T23:12:42.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237572025-03-07T23:12:42.290ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237582025-03-07T23:12:42.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237592025-03-07T23:12:42.301ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237602025-03-07T23:12:42.305ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237612025-03-07T23:12:42.305ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237622025-03-07T23:12:42.305ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237632025-03-07T23:12:42.313ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237642025-03-07T23:12:42.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237652025-03-07T23:12:42.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237662025-03-07T23:12:42.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237672025-03-07T23:12:42.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237682025-03-07T23:12:42.388ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237692025-03-07T23:12:42.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 267601 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cab88d04-6c1d-48b2-a749-403ad5fed0d5 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237702025-03-07T23:12:42.391ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
237712025-03-07T23:12:42.392ZINFOtest_unauthorized (external client test context): client received response status = 404
237722025-03-07T23:12:42.393ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237732025-03-07T23:12:42.393ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237742025-03-07T23:12:42.393ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4796cfab-d448-48b2-ac0b-66bf4cf2d61c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237752025-03-07T23:12:42.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4796cfab-d448-48b2-ac0b-66bf4cf2d61c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237762025-03-07T23:12:42.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4796cfab-d448-48b2-ac0b-66bf4cf2d61c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237772025-03-07T23:12:42.395ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4796cfab-d448-48b2-ac0b-66bf4cf2d61c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237782025-03-07T23:12:42.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 8831 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4796cfab-d448-48b2-ac0b-66bf4cf2d61c response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237792025-03-07T23:12:42.403ZINFOtest_unauthorized (external client test context): client received response status = 401
237802025-03-07T23:12:42.404ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237812025-03-07T23:12:42.405ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237822025-03-07T23:12:42.405ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 53f5c61e-b898-4234-9307-0f611591226c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237832025-03-07T23:12:42.405ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 53f5c61e-b898-4234-9307-0f611591226c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237842025-03-07T23:12:42.405ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 53f5c61e-b898-4234-9307-0f611591226c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237852025-03-07T23:12:42.406ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1500 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 53f5c61e-b898-4234-9307-0f611591226c response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237862025-03-07T23:12:42.406ZINFOtest_unauthorized (external client test context): client received response status = 401
237872025-03-07T23:12:42.408ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237882025-03-07T23:12:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237892025-03-07T23:12:42.412ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9ed509a9-744c-4a6c-b178-7d5d888f98c8 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237902025-03-07T23:12:42.412ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9ed509a9-744c-4a6c-b178-7d5d888f98c8 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237912025-03-07T23:12:42.414ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5206:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5234:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9ed509a9-744c-4a6c-b178-7d5d888f98c8 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237922025-03-07T23:12:42.414ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2180 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9ed509a9-744c-4a6c-b178-7d5d888f98c8 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237932025-03-07T23:12:42.414ZINFOtest_unauthorized (external client test context): client received response status = 401
237942025-03-07T23:12:42.415ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237952025-03-07T23:12:42.415ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237962025-03-07T23:12:42.415ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca3a6b13-ce5f-4e57-b6ed-33e0b090d3b0 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237972025-03-07T23:12:42.415ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca3a6b13-ce5f-4e57-b6ed-33e0b090d3b0 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
237982025-03-07T23:12:42.415ZINFOtest_unauthorized (external client test context): client received response status = 405
237992025-03-07T23:12:42.417ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238002025-03-07T23:12:42.419ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238012025-03-07T23:12:42.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 362a2647-f529-42b3-bdd9-f869258965c4 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238022025-03-07T23:12:42.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 362a2647-f529-42b3-bdd9-f869258965c4 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238032025-03-07T23:12:42.420ZINFOtest_unauthorized (external client test context): client received response status = 405
238042025-03-07T23:12:42.420ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238052025-03-07T23:12:42.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238062025-03-07T23:12:42.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f6fc4774-0d62-4a56-9e63-485973760f17 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238072025-03-07T23:12:42.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f6fc4774-0d62-4a56-9e63-485973760f17 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238082025-03-07T23:12:42.420ZINFOtest_unauthorized (external client test context): client received response status = 405
238092025-03-07T23:12:42.420ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238102025-03-07T23:12:42.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238112025-03-07T23:12:42.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8a2a93d8-4009-4979-937b-66528fe725d3 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238122025-03-07T23:12:42.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8a2a93d8-4009-4979-937b-66528fe725d3 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238132025-03-07T23:12:42.420ZINFOtest_unauthorized (external client test context): client received response status = 405
238142025-03-07T23:12:42.421ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238152025-03-07T23:12:42.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238162025-03-07T23:12:42.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a168100-4823-44c9-8243-a504512683a6 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238172025-03-07T23:12:42.424ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a168100-4823-44c9-8243-a504512683a6 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238182025-03-07T23:12:42.424ZINFOtest_unauthorized (external client test context): client received response status = 405
238192025-03-07T23:12:42.424ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238202025-03-07T23:12:42.424ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238212025-03-07T23:12:42.424ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2a6188d7-4ae6-4a81-b343-57abfe45073c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238222025-03-07T23:12:42.424ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2a6188d7-4ae6-4a81-b343-57abfe45073c response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238232025-03-07T23:12:42.425ZINFOtest_unauthorized (external client test context): client received response status = 405
238242025-03-07T23:12:42.426ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238252025-03-07T23:12:42.426ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238262025-03-07T23:12:42.426ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d84cebd-cc63-42c5-9ccc-9634653461bc uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238272025-03-07T23:12:42.426ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d84cebd-cc63-42c5-9ccc-9634653461bc response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238282025-03-07T23:12:42.427ZINFOtest_unauthorized (external client test context): client received response status = 405
238292025-03-07T23:12:42.428ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238302025-03-07T23:12:42.429ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238312025-03-07T23:12:42.429ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 02405d99-7556-4a4c-a7dc-cb5c6f7302d2 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238322025-03-07T23:12:42.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 02405d99-7556-4a4c-a7dc-cb5c6f7302d2 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238332025-03-07T23:12:42.429ZINFOtest_unauthorized (external client test context): client received response status = 405
238342025-03-07T23:12:42.429ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238352025-03-07T23:12:42.429ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238362025-03-07T23:12:42.429ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c9ac2f0c-5a13-4c3a-9bc4-f831bde30ba3 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238372025-03-07T23:12:42.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c9ac2f0c-5a13-4c3a-9bc4-f831bde30ba3 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238382025-03-07T23:12:42.431ZINFOtest_unauthorized (external client test context): client received response status = 405
238392025-03-07T23:12:42.436ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238402025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238412025-03-07T23:12:42.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e9f13c4f-8772-4ad8-857a-9a7698005d1a uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238422025-03-07T23:12:42.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e9f13c4f-8772-4ad8-857a-9a7698005d1a response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238432025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client received response status = 405
238442025-03-07T23:12:42.436ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238452025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238462025-03-07T23:12:42.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 46bd2b95-7ec3-4732-856b-27fa032a6983 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238472025-03-07T23:12:42.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 46bd2b95-7ec3-4732-856b-27fa032a6983 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238482025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client received response status = 405
238492025-03-07T23:12:42.436ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238502025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238512025-03-07T23:12:42.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 652530e1-b538-48f9-be51-d80b8a001c28 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238522025-03-07T23:12:42.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 652530e1-b538-48f9-be51-d80b8a001c28 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238532025-03-07T23:12:42.436ZINFOtest_unauthorized (external client test context): client received response status = 405
238542025-03-07T23:12:42.437ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238552025-03-07T23:12:42.437ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238562025-03-07T23:12:42.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 879db4a2-5637-4c54-a59a-96928d1e267c uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238572025-03-07T23:12:42.437ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 879db4a2-5637-4c54-a59a-96928d1e267c response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238582025-03-07T23:12:42.437ZINFOtest_unauthorized (external client test context): client received response status = 405
238592025-03-07T23:12:42.437ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238602025-03-07T23:12:42.437ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238612025-03-07T23:12:42.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0edbc1b7-c66e-4869-8d2f-cbb68a6dd045 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238622025-03-07T23:12:42.437ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0edbc1b7-c66e-4869-8d2f-cbb68a6dd045 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238632025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client received response status = 405
238642025-03-07T23:12:42.438ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238652025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238662025-03-07T23:12:42.438ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 79347ca2-8b1c-42a2-a048-8458d43245d8 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238672025-03-07T23:12:42.438ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 79347ca2-8b1c-42a2-a048-8458d43245d8 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238682025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client received response status = 405
238692025-03-07T23:12:42.438ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238702025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238712025-03-07T23:12:42.438ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92dc7516-7fdc-4a7b-9003-f0959a0efba0 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238722025-03-07T23:12:42.438ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92dc7516-7fdc-4a7b-9003-f0959a0efba0 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238732025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client received response status = 405
238742025-03-07T23:12:42.438ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238752025-03-07T23:12:42.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238762025-03-07T23:12:42.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238772025-03-07T23:12:42.442ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238782025-03-07T23:12:42.442ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238792025-03-07T23:12:42.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238802025-03-07T23:12:42.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238812025-03-07T23:12:42.446ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238822025-03-07T23:12:42.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238832025-03-07T23:12:42.449ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238842025-03-07T23:12:42.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238852025-03-07T23:12:42.451ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
238862025-03-07T23:12:42.451ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
238872025-03-07T23:12:42.452ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238882025-03-07T23:12:42.453ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238892025-03-07T23:12:42.453ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238902025-03-07T23:12:42.454ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
238912025-03-07T23:12:42.454ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238922025-03-07T23:12:42.455ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238932025-03-07T23:12:42.455ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238942025-03-07T23:12:42.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
238952025-03-07T23:12:42.460ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
238962025-03-07T23:12:42.460ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238972025-03-07T23:12:42.460ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238982025-03-07T23:12:42.461ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238992025-03-07T23:12:42.464ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
239002025-03-07T23:12:42.464ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
239012025-03-07T23:12:42.464ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239022025-03-07T23:12:42.464ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239032025-03-07T23:12:42.465ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239042025-03-07T23:12:42.467ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
239052025-03-07T23:12:42.467ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239062025-03-07T23:12:42.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239072025-03-07T23:12:42.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239082025-03-07T23:12:42.471ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
239092025-03-07T23:12:42.485ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
239102025-03-07T23:12:42.486ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239112025-03-07T23:12:42.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239122025-03-07T23:12:42.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239132025-03-07T23:12:42.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239142025-03-07T23:12:42.495ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239152025-03-07T23:12:42.496ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239162025-03-07T23:12:42.497ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239172025-03-07T23:12:42.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239182025-03-07T23:12:42.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239192025-03-07T23:12:42.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239202025-03-07T23:12:42.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239212025-03-07T23:12:42.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239222025-03-07T23:12:42.512ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239232025-03-07T23:12:42.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239242025-03-07T23:12:42.517ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239252025-03-07T23:12:42.517ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239262025-03-07T23:12:42.517ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239272025-03-07T23:12:42.517ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239282025-03-07T23:12:42.521ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239292025-03-07T23:12:42.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239302025-03-07T23:12:42.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239312025-03-07T23:12:42.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239322025-03-07T23:12:42.526ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239332025-03-07T23:12:42.527ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239342025-03-07T23:12:42.527ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239352025-03-07T23:12:42.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239362025-03-07T23:12:42.530ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239372025-03-07T23:12:42.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239382025-03-07T23:12:42.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239392025-03-07T23:12:42.541ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239402025-03-07T23:12:42.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239412025-03-07T23:12:42.542ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239422025-03-07T23:12:42.542ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239432025-03-07T23:12:42.550ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239442025-03-07T23:12:42.550ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239452025-03-07T23:12:42.552ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239462025-03-07T23:12:42.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239472025-03-07T23:12:42.555ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239482025-03-07T23:12:42.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239492025-03-07T23:12:42.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239502025-03-07T23:12:42.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239512025-03-07T23:12:42.560ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239522025-03-07T23:12:42.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: 1b82fd14-ed15-44a3-a968-8fc070a8312e, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239532025-03-07T23:12:42.571ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239542025-03-07T23:12:42.571ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239552025-03-07T23:12:42.571ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239562025-03-07T23:12:42.574ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 133778 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5890ffe2-b44f-479e-9f58-2fd87a4d29f4 response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239572025-03-07T23:12:42.575ZINFOtest_unauthorized (external client test context): client received response status = 200
239582025-03-07T23:12:42.575ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
239592025-03-07T23:12:42.575ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
239602025-03-07T23:12:42.576ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
239612025-03-07T23:12:42.576ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
239622025-03-07T23:12:42.576ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
239632025-03-07T23:12:42.577ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
239642025-03-07T23:12:42.577ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239652025-03-07T23:12:42.577ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239662025-03-07T23:12:42.577ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239672025-03-07T23:12:42.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239682025-03-07T23:12:42.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239692025-03-07T23:12:42.582ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239702025-03-07T23:12:42.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
239712025-03-07T23:12:42.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
239722025-03-07T23:12:42.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239732025-03-07T23:12:42.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239742025-03-07T23:12:42.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239752025-03-07T23:12:42.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239762025-03-07T23:12:42.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239772025-03-07T23:12:42.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239782025-03-07T23:12:42.592ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239792025-03-07T23:12:42.592ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239802025-03-07T23:12:42.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239812025-03-07T23:12:42.594ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
239822025-03-07T23:12:42.595ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239832025-03-07T23:12:42.595ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239842025-03-07T23:12:42.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239852025-03-07T23:12:42.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
239862025-03-07T23:12:42.610ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
239872025-03-07T23:12:42.610ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239882025-03-07T23:12:42.611ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239892025-03-07T23:12:42.613ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239902025-03-07T23:12:42.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
239912025-03-07T23:12:42.630ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
239922025-03-07T23:12:42.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239932025-03-07T23:12:42.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239942025-03-07T23:12:42.631ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239952025-03-07T23:12:42.636ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
239962025-03-07T23:12:42.636ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239972025-03-07T23:12:42.636ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239982025-03-07T23:12:42.637ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239992025-03-07T23:12:42.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
240002025-03-07T23:12:42.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
240012025-03-07T23:12:42.643ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240022025-03-07T23:12:42.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240032025-03-07T23:12:42.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240042025-03-07T23:12:42.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240052025-03-07T23:12:42.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240062025-03-07T23:12:42.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240072025-03-07T23:12:42.647ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240082025-03-07T23:12:42.650ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240092025-03-07T23:12:42.650ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240102025-03-07T23:12:42.651ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240112025-03-07T23:12:42.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240122025-03-07T23:12:42.653ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240132025-03-07T23:12:42.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240142025-03-07T23:12:42.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240152025-03-07T23:12:42.654ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240162025-03-07T23:12:42.666ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240172025-03-07T23:12:42.666ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240182025-03-07T23:12:42.667ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240192025-03-07T23:12:42.667ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240202025-03-07T23:12:42.671ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240212025-03-07T23:12:42.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240222025-03-07T23:12:42.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240232025-03-07T23:12:42.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240242025-03-07T23:12:42.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240252025-03-07T23:12:42.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240262025-03-07T23:12:42.683ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240272025-03-07T23:12:42.683ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240282025-03-07T23:12:42.683ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240292025-03-07T23:12:42.683ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240302025-03-07T23:12:42.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240312025-03-07T23:12:42.692ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240322025-03-07T23:12:42.692ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240332025-03-07T23:12:42.692ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240342025-03-07T23:12:42.693ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240352025-03-07T23:12:42.701ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240362025-03-07T23:12:42.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240372025-03-07T23:12:42.701ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240382025-03-07T23:12:42.704ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240392025-03-07T23:12:42.710ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240402025-03-07T23:12:42.714ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240412025-03-07T23:12:42.714ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240422025-03-07T23:12:42.714ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240432025-03-07T23:12:42.714ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240442025-03-07T23:12:42.717ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 141437 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c6ac58d0-c67b-4747-9310-bd3e2ae3b53f response_code = 200 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240452025-03-07T23:12:42.719ZINFOtest_unauthorized (external client test context): client received response status = 200
240462025-03-07T23:12:42.719ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240472025-03-07T23:12:42.719ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
240482025-03-07T23:12:42.719ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240492025-03-07T23:12:42.719ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240502025-03-07T23:12:42.719ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240512025-03-07T23:12:42.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240522025-03-07T23:12:42.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240532025-03-07T23:12:42.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240542025-03-07T23:12:42.721ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240552025-03-07T23:12:42.721ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240562025-03-07T23:12:42.721ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240572025-03-07T23:12:42.726ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
240582025-03-07T23:12:42.728ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
240592025-03-07T23:12:42.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240602025-03-07T23:12:42.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240612025-03-07T23:12:42.729ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240622025-03-07T23:12:42.743ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
240632025-03-07T23:12:42.743ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240642025-03-07T23:12:42.743ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240652025-03-07T23:12:42.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240662025-03-07T23:12:42.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
240672025-03-07T23:12:42.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
240682025-03-07T23:12:42.758ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240692025-03-07T23:12:42.758ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240702025-03-07T23:12:42.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240712025-03-07T23:12:42.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
240722025-03-07T23:12:42.762ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
240732025-03-07T23:12:42.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240742025-03-07T23:12:42.762ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240752025-03-07T23:12:42.764ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240762025-03-07T23:12:42.773ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
240772025-03-07T23:12:42.773ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
240782025-03-07T23:12:42.773ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
240792025-03-07T23:12:42.776ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
240802025-03-07T23:12:42.792ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
240812025-03-07T23:12:42.797ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
240822025-03-07T23:12:42.799ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240832025-03-07T23:12:42.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240842025-03-07T23:12:42.799ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240852025-03-07T23:12:42.799ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240862025-03-07T23:12:42.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240872025-03-07T23:12:42.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240882025-03-07T23:12:42.813ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240892025-03-07T23:12:42.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240902025-03-07T23:12:42.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240912025-03-07T23:12:42.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240922025-03-07T23:12:42.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240932025-03-07T23:12:42.841ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240942025-03-07T23:12:42.841ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240952025-03-07T23:12:42.841ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240962025-03-07T23:12:42.841ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240972025-03-07T23:12:42.845ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240982025-03-07T23:12:42.845ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
240992025-03-07T23:12:42.846ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241002025-03-07T23:12:42.846ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241012025-03-07T23:12:42.859ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241022025-03-07T23:12:42.859ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241032025-03-07T23:12:42.859ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241042025-03-07T23:12:42.861ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241052025-03-07T23:12:42.866ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241062025-03-07T23:12:42.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241072025-03-07T23:12:42.909ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 190664 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37f90ba4-c53f-4563-9a97-dffec0686e40 response_code = 404 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241082025-03-07T23:12:42.909ZINFOtest_unauthorized (external client test context): client received response status = 404
241092025-03-07T23:12:42.910ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241102025-03-07T23:12:42.910ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241112025-03-07T23:12:42.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54f7ca93-4373-48f4-8281-fc1a221e02bf uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241122025-03-07T23:12:42.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54f7ca93-4373-48f4-8281-fc1a221e02bf uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241132025-03-07T23:12:42.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54f7ca93-4373-48f4-8281-fc1a221e02bf uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241142025-03-07T23:12:42.910ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54f7ca93-4373-48f4-8281-fc1a221e02bf uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241152025-03-07T23:12:42.911ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 353 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54f7ca93-4373-48f4-8281-fc1a221e02bf response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241162025-03-07T23:12:42.911ZINFOtest_unauthorized (external client test context): client received response status = 401
241172025-03-07T23:12:42.911ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241182025-03-07T23:12:42.911ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241192025-03-07T23:12:42.911ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45370375-9e94-442a-b82a-86304760d2f6 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241202025-03-07T23:12:42.913ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45370375-9e94-442a-b82a-86304760d2f6 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241212025-03-07T23:12:42.913ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45370375-9e94-442a-b82a-86304760d2f6 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241222025-03-07T23:12:42.913ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 244 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45370375-9e94-442a-b82a-86304760d2f6 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241232025-03-07T23:12:42.913ZINFOtest_unauthorized (external client test context): client received response status = 401
241242025-03-07T23:12:42.913ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241252025-03-07T23:12:42.913ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241262025-03-07T23:12:42.914ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99181779-c84d-4a89-ba9d-73215ba29ffe uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241272025-03-07T23:12:42.914ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99181779-c84d-4a89-ba9d-73215ba29ffe uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241282025-03-07T23:12:42.914ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5307:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5331:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99181779-c84d-4a89-ba9d-73215ba29ffe uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241292025-03-07T23:12:42.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1941 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99181779-c84d-4a89-ba9d-73215ba29ffe response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241302025-03-07T23:12:42.914ZINFOtest_unauthorized (external client test context): client received response status = 401
241312025-03-07T23:12:42.914ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241322025-03-07T23:12:42.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241332025-03-07T23:12:42.915ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e76acabc-b786-493e-8ad1-f7e2d3f731df uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241342025-03-07T23:12:42.915ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e76acabc-b786-493e-8ad1-f7e2d3f731df response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241352025-03-07T23:12:42.915ZINFOtest_unauthorized (external client test context): client received response status = 405
241362025-03-07T23:12:42.916ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241372025-03-07T23:12:42.916ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241382025-03-07T23:12:42.916ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 61983856-c85f-48db-bdb2-4a0bdbc5cfd4 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241392025-03-07T23:12:42.916ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 61983856-c85f-48db-bdb2-4a0bdbc5cfd4 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241402025-03-07T23:12:42.916ZINFOtest_unauthorized (external client test context): client received response status = 405
241412025-03-07T23:12:42.916ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241422025-03-07T23:12:42.917ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241432025-03-07T23:12:42.917ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c6c3fb7c-b901-4306-a220-90f4cf79dad4 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241442025-03-07T23:12:42.917ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c6c3fb7c-b901-4306-a220-90f4cf79dad4 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241452025-03-07T23:12:42.917ZINFOtest_unauthorized (external client test context): client received response status = 405
241462025-03-07T23:12:42.917ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241472025-03-07T23:12:42.917ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241482025-03-07T23:12:42.917ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d6e2fde-bb09-4c02-979f-f4597c487254 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241492025-03-07T23:12:42.917ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2d6e2fde-bb09-4c02-979f-f4597c487254 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241502025-03-07T23:12:42.918ZINFOtest_unauthorized (external client test context): client received response status = 405
241512025-03-07T23:12:42.918ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241522025-03-07T23:12:42.918ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
241532025-03-07T23:12:42.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241542025-03-07T23:12:42.919ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241552025-03-07T23:12:42.919ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241562025-03-07T23:12:42.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241572025-03-07T23:12:42.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241582025-03-07T23:12:42.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241592025-03-07T23:12:42.923ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241602025-03-07T23:12:42.923ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241612025-03-07T23:12:42.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241622025-03-07T23:12:42.928ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
241632025-03-07T23:12:42.929ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
241642025-03-07T23:12:42.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241652025-03-07T23:12:42.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241662025-03-07T23:12:42.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241672025-03-07T23:12:42.931ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
241682025-03-07T23:12:42.933ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241692025-03-07T23:12:42.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241702025-03-07T23:12:42.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241712025-03-07T23:12:42.937ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
241722025-03-07T23:12:42.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
241732025-03-07T23:12:42.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241742025-03-07T23:12:42.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241752025-03-07T23:12:42.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241762025-03-07T23:12:42.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
241772025-03-07T23:12:42.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
241782025-03-07T23:12:42.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241792025-03-07T23:12:42.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241802025-03-07T23:12:42.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241812025-03-07T23:12:42.953ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
241822025-03-07T23:12:42.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241832025-03-07T23:12:42.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241842025-03-07T23:12:42.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241852025-03-07T23:12:42.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
241862025-03-07T23:12:42.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
241872025-03-07T23:12:42.960ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241882025-03-07T23:12:42.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241892025-03-07T23:12:42.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241902025-03-07T23:12:42.961ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241912025-03-07T23:12:42.963ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241922025-03-07T23:12:42.963ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241932025-03-07T23:12:42.964ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241942025-03-07T23:12:42.970ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241952025-03-07T23:12:42.970ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241962025-03-07T23:12:42.977ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241972025-03-07T23:12:42.987ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241982025-03-07T23:12:42.987ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
241992025-03-07T23:12:42.987ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242002025-03-07T23:12:42.989ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242012025-03-07T23:12:42.990ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242022025-03-07T23:12:42.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242032025-03-07T23:12:42.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242042025-03-07T23:12:42.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242052025-03-07T23:12:42.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242062025-03-07T23:12:43.006ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242072025-03-07T23:12:43.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242082025-03-07T23:12:43.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242092025-03-07T23:12:43.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242102025-03-07T23:12:43.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242112025-03-07T23:12:43.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242122025-03-07T23:12:43.035ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 118305 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 766642a4-abf6-4af5-9422-82f68005b383 response_code = 404 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242132025-03-07T23:12:43.036ZINFOtest_unauthorized (external client test context): client received response status = 404
242142025-03-07T23:12:43.036ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242152025-03-07T23:12:43.036ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242162025-03-07T23:12:43.037ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae407c60-c6d8-4f54-bcf0-4e2a953b7cde uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242172025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae407c60-c6d8-4f54-bcf0-4e2a953b7cde uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242182025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae407c60-c6d8-4f54-bcf0-4e2a953b7cde uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242192025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae407c60-c6d8-4f54-bcf0-4e2a953b7cde uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242202025-03-07T23:12:43.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 588 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae407c60-c6d8-4f54-bcf0-4e2a953b7cde response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242212025-03-07T23:12:43.039ZINFOtest_unauthorized (external client test context): client received response status = 401
242222025-03-07T23:12:43.039ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242232025-03-07T23:12:43.039ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242242025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae8b08e-b96c-4dd9-a0c0-ced357f8b37a uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242252025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae8b08e-b96c-4dd9-a0c0-ced357f8b37a uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242262025-03-07T23:12:43.039ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae8b08e-b96c-4dd9-a0c0-ced357f8b37a uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242272025-03-07T23:12:43.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 263 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae8b08e-b96c-4dd9-a0c0-ced357f8b37a response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242282025-03-07T23:12:43.039ZINFOtest_unauthorized (external client test context): client received response status = 401
242292025-03-07T23:12:43.039ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242302025-03-07T23:12:43.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242312025-03-07T23:12:43.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c652254-8fc6-4e20-b778-08a7495047c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242322025-03-07T23:12:43.042ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c652254-8fc6-4e20-b778-08a7495047c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242332025-03-07T23:12:43.042ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5375:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5391:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c652254-8fc6-4e20-b778-08a7495047c9 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242342025-03-07T23:12:43.042ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1130 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c652254-8fc6-4e20-b778-08a7495047c9 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242352025-03-07T23:12:43.043ZINFOtest_unauthorized (external client test context): client received response status = 401
242362025-03-07T23:12:43.043ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242372025-03-07T23:12:43.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242382025-03-07T23:12:43.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23168732-5c4f-4da1-a670-8b9235189741 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242392025-03-07T23:12:43.043ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 23168732-5c4f-4da1-a670-8b9235189741 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242402025-03-07T23:12:43.044ZINFOtest_unauthorized (external client test context): client received response status = 405
242412025-03-07T23:12:43.044ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242422025-03-07T23:12:43.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242432025-03-07T23:12:43.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 19119c2b-3e5b-48e7-9893-39d47feb9fe2 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242442025-03-07T23:12:43.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 19119c2b-3e5b-48e7-9893-39d47feb9fe2 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242452025-03-07T23:12:43.044ZINFOtest_unauthorized (external client test context): client received response status = 405
242462025-03-07T23:12:43.044ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242472025-03-07T23:12:43.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242482025-03-07T23:12:43.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a2315a10-59ff-47ad-b7dd-81ede0bf7dee uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242492025-03-07T23:12:43.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a2315a10-59ff-47ad-b7dd-81ede0bf7dee response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242502025-03-07T23:12:43.044ZINFOtest_unauthorized (external client test context): client received response status = 405
242512025-03-07T23:12:43.045ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242522025-03-07T23:12:43.045ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242532025-03-07T23:12:43.045ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 44dea19e-b767-451f-9ca5-7b63573bda95 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242542025-03-07T23:12:43.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 44dea19e-b767-451f-9ca5-7b63573bda95 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242552025-03-07T23:12:43.046ZINFOtest_unauthorized (external client test context): client received response status = 405
242562025-03-07T23:12:43.046ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242572025-03-07T23:12:43.046ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242582025-03-07T23:12:43.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1bd1127f-75f4-4a33-bc30-f6f3f23b7c4d uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242592025-03-07T23:12:43.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 179 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1bd1127f-75f4-4a33-bc30-f6f3f23b7c4d response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242602025-03-07T23:12:43.057ZINFOtest_unauthorized (external client test context): client received response status = 405
242612025-03-07T23:12:43.066ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242622025-03-07T23:12:43.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242632025-03-07T23:12:43.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 91cdef85-e1e5-4322-95e2-9fab6611a6c0 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242642025-03-07T23:12:43.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 249 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 91cdef85-e1e5-4322-95e2-9fab6611a6c0 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242652025-03-07T23:12:43.067ZINFOtest_unauthorized (external client test context): client received response status = 405
242662025-03-07T23:12:43.067ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242672025-03-07T23:12:43.068ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242682025-03-07T23:12:43.069ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5d2422c5-1c8b-41ed-a48c-aa0a5b7d94dc uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242692025-03-07T23:12:43.069ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5d2422c5-1c8b-41ed-a48c-aa0a5b7d94dc response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242702025-03-07T23:12:43.069ZINFOtest_unauthorized (external client test context): client received response status = 405
242712025-03-07T23:12:43.069ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242722025-03-07T23:12:43.069ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242732025-03-07T23:12:43.069ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 352270f3-7e92-4ad2-a179-a8232736ba25 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242742025-03-07T23:12:43.069ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 352270f3-7e92-4ad2-a179-a8232736ba25 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242752025-03-07T23:12:43.069ZINFOtest_unauthorized (external client test context): client received response status = 405
242762025-03-07T23:12:43.070ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242772025-03-07T23:12:43.072ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242782025-03-07T23:12:43.072ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242792025-03-07T23:12:43.072ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242802025-03-07T23:12:43.072ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242812025-03-07T23:12:43.072ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242822025-03-07T23:12:43.072ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242832025-03-07T23:12:43.075ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242842025-03-07T23:12:43.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242852025-03-07T23:12:43.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242862025-03-07T23:12:43.082ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242872025-03-07T23:12:43.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
242882025-03-07T23:12:43.084ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
242892025-03-07T23:12:43.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242902025-03-07T23:12:43.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242912025-03-07T23:12:43.085ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242922025-03-07T23:12:43.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
242932025-03-07T23:12:43.088ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242942025-03-07T23:12:43.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242952025-03-07T23:12:43.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242962025-03-07T23:12:43.093ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
242972025-03-07T23:12:43.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
242982025-03-07T23:12:43.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242992025-03-07T23:12:43.097ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243002025-03-07T23:12:43.098ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243012025-03-07T23:12:43.104ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
243022025-03-07T23:12:43.105ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
243032025-03-07T23:12:43.106ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243042025-03-07T23:12:43.106ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243052025-03-07T23:12:43.106ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243062025-03-07T23:12:43.108ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
243072025-03-07T23:12:43.108ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243082025-03-07T23:12:43.108ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243092025-03-07T23:12:43.109ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243102025-03-07T23:12:43.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
243112025-03-07T23:12:43.115ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
243122025-03-07T23:12:43.115ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243132025-03-07T23:12:43.115ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243142025-03-07T23:12:43.115ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243152025-03-07T23:12:43.116ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243162025-03-07T23:12:43.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243172025-03-07T23:12:43.117ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243182025-03-07T23:12:43.118ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243192025-03-07T23:12:43.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243202025-03-07T23:12:43.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243212025-03-07T23:12:43.122ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243222025-03-07T23:12:43.123ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243232025-03-07T23:12:43.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243242025-03-07T23:12:43.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243252025-03-07T23:12:43.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243262025-03-07T23:12:43.124ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243272025-03-07T23:12:43.129ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243282025-03-07T23:12:43.129ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243292025-03-07T23:12:43.129ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243302025-03-07T23:12:43.130ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243312025-03-07T23:12:43.132ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243322025-03-07T23:12:43.133ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243332025-03-07T23:12:43.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243342025-03-07T23:12:43.133ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243352025-03-07T23:12:43.136ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243362025-03-07T23:12:43.145ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243372025-03-07T23:12:43.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243382025-03-07T23:12:43.146ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243392025-03-07T23:12:43.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243402025-03-07T23:12:43.146ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243412025-03-07T23:12:43.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243422025-03-07T23:12:43.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243432025-03-07T23:12:43.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243442025-03-07T23:12:43.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243452025-03-07T23:12:43.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243462025-03-07T23:12:43.155ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243472025-03-07T23:12:43.156ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243482025-03-07T23:12:43.156ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243492025-03-07T23:12:43.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243502025-03-07T23:12:43.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243512025-03-07T23:12:43.182ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243522025-03-07T23:12:43.182ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243532025-03-07T23:12:43.182ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243542025-03-07T23:12:43.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243552025-03-07T23:12:43.190ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 119128 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 96fdcb0b-a3c8-4a7e-81b7-78c336045dd0 response_code = 200 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243562025-03-07T23:12:43.190ZINFOtest_unauthorized (external client test context): client received response status = 200
243572025-03-07T23:12:43.191ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243582025-03-07T23:12:43.191ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243592025-03-07T23:12:43.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243602025-03-07T23:12:43.192ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243612025-03-07T23:12:43.192ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243622025-03-07T23:12:43.194ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
243632025-03-07T23:12:43.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243642025-03-07T23:12:43.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243652025-03-07T23:12:43.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243662025-03-07T23:12:43.220ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
243672025-03-07T23:12:43.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
243682025-03-07T23:12:43.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
243692025-03-07T23:12:43.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
243702025-03-07T23:12:43.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243712025-03-07T23:12:43.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243722025-03-07T23:12:43.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243732025-03-07T23:12:43.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
243742025-03-07T23:12:43.232ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
243752025-03-07T23:12:43.232ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243762025-03-07T23:12:43.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243772025-03-07T23:12:43.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243782025-03-07T23:12:43.234ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
243792025-03-07T23:12:43.236ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
243802025-03-07T23:12:43.236ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
243812025-03-07T23:12:43.236ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243822025-03-07T23:12:43.236ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243832025-03-07T23:12:43.236ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243842025-03-07T23:12:43.238ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
243852025-03-07T23:12:43.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
243862025-03-07T23:12:43.241ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243872025-03-07T23:12:43.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243882025-03-07T23:12:43.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243892025-03-07T23:12:43.244ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
243902025-03-07T23:12:43.244ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
243912025-03-07T23:12:43.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
243922025-03-07T23:12:43.245ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
243932025-03-07T23:12:43.245ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243942025-03-07T23:12:43.245ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243952025-03-07T23:12:43.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243962025-03-07T23:12:43.248ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
243972025-03-07T23:12:43.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243982025-03-07T23:12:43.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243992025-03-07T23:12:43.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244002025-03-07T23:12:43.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
244012025-03-07T23:12:43.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
244022025-03-07T23:12:43.263ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244032025-03-07T23:12:43.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244042025-03-07T23:12:43.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244052025-03-07T23:12:43.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244062025-03-07T23:12:43.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244072025-03-07T23:12:43.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244082025-03-07T23:12:43.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244092025-03-07T23:12:43.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244102025-03-07T23:12:43.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244112025-03-07T23:12:43.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244122025-03-07T23:12:43.300ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244132025-03-07T23:12:43.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244142025-03-07T23:12:43.314ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244152025-03-07T23:12:43.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244162025-03-07T23:12:43.314ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244172025-03-07T23:12:43.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244182025-03-07T23:12:43.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244192025-03-07T23:12:43.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244202025-03-07T23:12:43.315ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244212025-03-07T23:12:43.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244222025-03-07T23:12:43.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244232025-03-07T23:12:43.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244242025-03-07T23:12:43.315ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244252025-03-07T23:12:43.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244262025-03-07T23:12:43.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244272025-03-07T23:12:43.318ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244282025-03-07T23:12:43.328ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
244292025-03-07T23:12:43.331ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244302025-03-07T23:12:43.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244312025-03-07T23:12:43.364ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 172017 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 38eb84a2-24be-450e-b321-538906a411ff response_code = 200 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244322025-03-07T23:12:43.364ZINFOtest_unauthorized (external client test context): client received response status = 200
244332025-03-07T23:12:43.365ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244342025-03-07T23:12:43.365ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244352025-03-07T23:12:43.365ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244362025-03-07T23:12:43.365ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244372025-03-07T23:12:43.367ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244382025-03-07T23:12:43.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244392025-03-07T23:12:43.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244402025-03-07T23:12:43.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244412025-03-07T23:12:43.373ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244422025-03-07T23:12:43.373ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244432025-03-07T23:12:43.375ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244442025-03-07T23:12:43.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
244452025-03-07T23:12:43.379ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
244462025-03-07T23:12:43.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244472025-03-07T23:12:43.380ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244482025-03-07T23:12:43.380ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244492025-03-07T23:12:43.382ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
244502025-03-07T23:12:43.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244512025-03-07T23:12:43.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244522025-03-07T23:12:43.382ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244532025-03-07T23:12:43.383ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
244542025-03-07T23:12:43.390ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
244552025-03-07T23:12:43.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244562025-03-07T23:12:43.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244572025-03-07T23:12:43.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244582025-03-07T23:12:43.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
244592025-03-07T23:12:43.392ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
244602025-03-07T23:12:43.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244612025-03-07T23:12:43.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244622025-03-07T23:12:43.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244632025-03-07T23:12:43.396ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
244642025-03-07T23:12:43.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244652025-03-07T23:12:43.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244662025-03-07T23:12:43.400ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244672025-03-07T23:12:43.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
244682025-03-07T23:12:43.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
244692025-03-07T23:12:43.416ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244702025-03-07T23:12:43.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244712025-03-07T23:12:43.417ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244722025-03-07T23:12:43.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244732025-03-07T23:12:43.427ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244742025-03-07T23:12:43.427ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244752025-03-07T23:12:43.427ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244762025-03-07T23:12:43.429ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244772025-03-07T23:12:43.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244782025-03-07T23:12:43.434ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244792025-03-07T23:12:43.436ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244802025-03-07T23:12:43.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244812025-03-07T23:12:43.439ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244822025-03-07T23:12:43.441ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244832025-03-07T23:12:43.442ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244842025-03-07T23:12:43.442ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244852025-03-07T23:12:43.442ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244862025-03-07T23:12:43.443ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244872025-03-07T23:12:43.449ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244882025-03-07T23:12:43.450ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244892025-03-07T23:12:43.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244902025-03-07T23:12:43.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244912025-03-07T23:12:43.458ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244922025-03-07T23:12:43.460ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244932025-03-07T23:12:43.460ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244942025-03-07T23:12:43.460ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244952025-03-07T23:12:43.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244962025-03-07T23:12:43.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244972025-03-07T23:12:43.496ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 130852 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647803f-7204-4d3d-a078-3476b8a65f92 response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
244982025-03-07T23:12:43.498ZINFOtest_unauthorized (external client test context): client received response status = 404
244992025-03-07T23:12:43.498ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245002025-03-07T23:12:43.498ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245012025-03-07T23:12:43.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70fc2208-25e1-4a55-b2b5-97541d8a24a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245022025-03-07T23:12:43.499ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70fc2208-25e1-4a55-b2b5-97541d8a24a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245032025-03-07T23:12:43.500ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70fc2208-25e1-4a55-b2b5-97541d8a24a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245042025-03-07T23:12:43.500ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70fc2208-25e1-4a55-b2b5-97541d8a24a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245052025-03-07T23:12:43.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 683 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 70fc2208-25e1-4a55-b2b5-97541d8a24a8 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245062025-03-07T23:12:43.501ZINFOtest_unauthorized (external client test context): client received response status = 401
245072025-03-07T23:12:43.501ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245082025-03-07T23:12:43.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245092025-03-07T23:12:43.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7995acb6-d737-4d96-a185-40697337e060 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245102025-03-07T23:12:43.501ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7995acb6-d737-4d96-a185-40697337e060 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245112025-03-07T23:12:43.501ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7995acb6-d737-4d96-a185-40697337e060 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245122025-03-07T23:12:43.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 944 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7995acb6-d737-4d96-a185-40697337e060 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245132025-03-07T23:12:43.502ZINFOtest_unauthorized (external client test context): client received response status = 401
245142025-03-07T23:12:43.502ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245152025-03-07T23:12:43.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245162025-03-07T23:12:43.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89a88816-08b5-4c21-937d-e7709b6713d3 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245172025-03-07T23:12:43.503ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89a88816-08b5-4c21-937d-e7709b6713d3 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245182025-03-07T23:12:43.505ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5345:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5361:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89a88816-08b5-4c21-937d-e7709b6713d3 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245192025-03-07T23:12:43.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1058 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 89a88816-08b5-4c21-937d-e7709b6713d3 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245202025-03-07T23:12:43.507ZINFOtest_unauthorized (external client test context): client received response status = 401
245212025-03-07T23:12:43.507ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245222025-03-07T23:12:43.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245232025-03-07T23:12:43.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245242025-03-07T23:12:43.507ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245252025-03-07T23:12:43.507ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245262025-03-07T23:12:43.507ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245272025-03-07T23:12:43.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245282025-03-07T23:12:43.507ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245292025-03-07T23:12:43.509ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245302025-03-07T23:12:43.512ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245312025-03-07T23:12:43.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245322025-03-07T23:12:43.514ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
245332025-03-07T23:12:43.514ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
245342025-03-07T23:12:43.515ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245352025-03-07T23:12:43.515ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245362025-03-07T23:12:43.516ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245372025-03-07T23:12:43.518ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
245382025-03-07T23:12:43.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245392025-03-07T23:12:43.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245402025-03-07T23:12:43.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245412025-03-07T23:12:43.522ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
245422025-03-07T23:12:43.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
245432025-03-07T23:12:43.529ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245442025-03-07T23:12:43.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245452025-03-07T23:12:43.530ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245462025-03-07T23:12:43.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
245472025-03-07T23:12:43.533ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
245482025-03-07T23:12:43.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245492025-03-07T23:12:43.533ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245502025-03-07T23:12:43.534ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245512025-03-07T23:12:43.536ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
245522025-03-07T23:12:43.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245532025-03-07T23:12:43.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245542025-03-07T23:12:43.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245552025-03-07T23:12:43.541ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
245562025-03-07T23:12:43.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
245572025-03-07T23:12:43.545ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245582025-03-07T23:12:43.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245592025-03-07T23:12:43.546ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245602025-03-07T23:12:43.546ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245612025-03-07T23:12:43.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245622025-03-07T23:12:43.549ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245632025-03-07T23:12:43.550ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245642025-03-07T23:12:43.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245652025-03-07T23:12:43.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245662025-03-07T23:12:43.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245672025-03-07T23:12:43.557ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245682025-03-07T23:12:43.557ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245692025-03-07T23:12:43.558ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245702025-03-07T23:12:43.568ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245712025-03-07T23:12:43.569ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245722025-03-07T23:12:43.569ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245732025-03-07T23:12:43.569ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245742025-03-07T23:12:43.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245752025-03-07T23:12:43.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
245762025-03-07T23:12:43.572ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245772025-03-07T23:12:43.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 865154ec-2cf9-4425-81d5-b61f0fdf4311 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245782025-03-07T23:12:43.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 865154ec-2cf9-4425-81d5-b61f0fdf4311 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245792025-03-07T23:12:43.574ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 865154ec-2cf9-4425-81d5-b61f0fdf4311 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245802025-03-07T23:12:43.577ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 865154ec-2cf9-4425-81d5-b61f0fdf4311 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245812025-03-07T23:12:43.578ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245822025-03-07T23:12:43.578ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245832025-03-07T23:12:43.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245842025-03-07T23:12:43.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245852025-03-07T23:12:43.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11682 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 865154ec-2cf9-4425-81d5-b61f0fdf4311 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
245862025-03-07T23:12:43.586ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "865154ec-2cf9-4425-81d5-b61f0fdf4311", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:43 GMT"} })
245872025-03-07T23:12:43.586ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
245882025-03-07T23:12:43.586ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245892025-03-07T23:12:43.587ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245902025-03-07T23:12:43.587ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245912025-03-07T23:12:43.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
245922025-03-07T23:12:43.588ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 20222b06-bae5-401e-9e02-eb994c02410b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
245932025-03-07T23:12:43.589ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245942025-03-07T23:12:43.589ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 20222b06-bae5-401e-9e02-eb994c02410b resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
245952025-03-07T23:12:43.589ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 20222b06-bae5-401e-9e02-eb994c02410b roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
245962025-03-07T23:12:43.589ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 20222b06-bae5-401e-9e02-eb994c02410b resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
245972025-03-07T23:12:43.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245982025-03-07T23:12:43.591ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245992025-03-07T23:12:43.592ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
246002025-03-07T23:12:43.592ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
246012025-03-07T23:12:43.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
246022025-03-07T23:12:43.593ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246032025-03-07T23:12:43.618ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246042025-03-07T23:12:43.618ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 114064 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = acf6622f-5fe5-45dc-9ad3-96eff408f328 response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246052025-03-07T23:12:43.619ZINFOtest_unauthorized (external client test context): client received response status = 404
246062025-03-07T23:12:43.620ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246072025-03-07T23:12:43.620ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246082025-03-07T23:12:43.620ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6770b7c6-15ad-4dae-84d2-4116d44eef07 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246092025-03-07T23:12:43.620ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6770b7c6-15ad-4dae-84d2-4116d44eef07 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246102025-03-07T23:12:43.621ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6770b7c6-15ad-4dae-84d2-4116d44eef07 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246112025-03-07T23:12:43.621ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6770b7c6-15ad-4dae-84d2-4116d44eef07 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246122025-03-07T23:12:43.621ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 600 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6770b7c6-15ad-4dae-84d2-4116d44eef07 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246132025-03-07T23:12:43.621ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 32707 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 20222b06-bae5-401e-9e02-eb994c02410b response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
246142025-03-07T23:12:43.621ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "20222b06-bae5-401e-9e02-eb994c02410b", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:43 GMT"} })
246152025-03-07T23:12:43.622ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
246162025-03-07T23:12:43.622ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246172025-03-07T23:12:43.622ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
246182025-03-07T23:12:43.622ZINFOtest_unauthorized (external client test context): client received response status = 401
246192025-03-07T23:12:43.622ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246202025-03-07T23:12:43.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246212025-03-07T23:12:43.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5446926-def4-46a2-ae6d-2c3fc2a6723b uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246222025-03-07T23:12:43.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5446926-def4-46a2-ae6d-2c3fc2a6723b uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246232025-03-07T23:12:43.624ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5446926-def4-46a2-ae6d-2c3fc2a6723b uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246242025-03-07T23:12:43.624ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 711 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a5446926-def4-46a2-ae6d-2c3fc2a6723b response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246252025-03-07T23:12:43.625ZINFOtest_unauthorized (external client test context): client received response status = 401
246262025-03-07T23:12:43.625ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246272025-03-07T23:12:43.625ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246282025-03-07T23:12:43.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7e87b6-a00d-4784-8bfd-9ffbefa3a50c uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246292025-03-07T23:12:43.626ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7e87b6-a00d-4784-8bfd-9ffbefa3a50c uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246302025-03-07T23:12:43.627ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5436:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5453:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7e87b6-a00d-4784-8bfd-9ffbefa3a50c uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246312025-03-07T23:12:43.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1897 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2e7e87b6-a00d-4784-8bfd-9ffbefa3a50c response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246322025-03-07T23:12:43.629ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246332025-03-07T23:12:43.629ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246342025-03-07T23:12:43.630ZINFOtest_unauthorized (external client test context): client received response status = 401
246352025-03-07T23:12:43.632ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246362025-03-07T23:12:43.632ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246372025-03-07T23:12:43.633ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = b6099f50-0a50-45eb-b0ca-22dc8d0e0e79 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246382025-03-07T23:12:43.860ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 227051 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = b6099f50-0a50-45eb-b0ca-22dc8d0e0e79 response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246392025-03-07T23:12:43.861ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 567e6327-3631-4d8d-a847-7151d9d2c53b uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246402025-03-07T23:12:43.861ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 256 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 567e6327-3631-4d8d-a847-7151d9d2c53b response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246412025-03-07T23:12:43.862ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
246422025-03-07T23:12:43.863ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
246432025-03-07T23:12:43.863ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
246442025-03-07T23:12:43.863ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246452025-03-07T23:12:44.085ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246462025-03-07T23:12:44.085ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246472025-03-07T23:12:44.085ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
246482025-03-07T23:12:44.087ZDEBGtest_unauthorized (results-sink): inserting 194 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
246492025-03-07T23:12:44.088ZDEBGtest_unauthorized (results-sink-cluster): inserting 194 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
246502025-03-07T23:12:44.088ZDEBGtest_unauthorized (clickhouse-client): unrolling 194 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
246512025-03-07T23:12:44.289ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
246522025-03-07T23:12:44.292ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
246532025-03-07T23:12:44.299ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
246542025-03-07T23:12:44.299ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
246552025-03-07T23:12:44.299ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
246562025-03-07T23:12:44.299ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
246572025-03-07T23:12:44.299ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
246582025-03-07T23:12:44.299ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
246592025-03-07T23:12:44.299ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
246602025-03-07T23:12:44.299ZINFOtest_unauthorized (external client test context): client received response status = 405
246612025-03-07T23:12:44.299ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246622025-03-07T23:12:44.299ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246632025-03-07T23:12:44.299ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2767aa3-8d9a-44d0-8854-987b0605ca7c uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246642025-03-07T23:12:44.299ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 99 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a2767aa3-8d9a-44d0-8854-987b0605ca7c response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246652025-03-07T23:12:44.299ZINFOtest_unauthorized (external client test context): client received response status = 405
246662025-03-07T23:12:44.300ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246672025-03-07T23:12:44.300ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246682025-03-07T23:12:44.300ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 673b2c51-e6c5-4310-97f8-67f67ad465a3 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246692025-03-07T23:12:44.300ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 673b2c51-e6c5-4310-97f8-67f67ad465a3 response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246702025-03-07T23:12:44.324ZINFOtest_unauthorized (external client test context): client received response status = 405
246712025-03-07T23:12:44.324ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246722025-03-07T23:12:44.324ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246732025-03-07T23:12:44.327ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = fields_ipaddr
246742025-03-07T23:12:44.328ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 388 sql = INSERT INTO oximeter.fields_string FORMAT Native
246752025-03-07T23:12:44.328ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64d3ab4c-c806-4422-8a4b-1159fd647beb uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246762025-03-07T23:12:44.328ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 122 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64d3ab4c-c806-4422-8a4b-1159fd647beb response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246772025-03-07T23:12:44.333ZINFOtest_unauthorized (external client test context): client received response status = 405
246782025-03-07T23:12:44.333ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246792025-03-07T23:12:44.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246802025-03-07T23:12:44.335ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246812025-03-07T23:12:44.339ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246822025-03-07T23:12:44.339ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246832025-03-07T23:12:44.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246842025-03-07T23:12:44.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246852025-03-07T23:12:44.340ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246862025-03-07T23:12:44.340ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 388 table_name = fields_string
246872025-03-07T23:12:44.347ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 193 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
246882025-03-07T23:12:44.349ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246892025-03-07T23:12:44.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246902025-03-07T23:12:44.356ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246912025-03-07T23:12:44.381ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
246922025-03-07T23:12:44.383ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
246932025-03-07T23:12:44.383ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246942025-03-07T23:12:44.383ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246952025-03-07T23:12:44.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246962025-03-07T23:12:44.387ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 193 table_name = fields_u16
246972025-03-07T23:12:44.387ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 199 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
246982025-03-07T23:12:44.397ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
246992025-03-07T23:12:44.401ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247002025-03-07T23:12:44.401ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247012025-03-07T23:12:44.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247022025-03-07T23:12:44.408ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 199 table_name = fields_uuid
247032025-03-07T23:12:44.410ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
247042025-03-07T23:12:44.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
247052025-03-07T23:12:44.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
247062025-03-07T23:12:44.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247072025-03-07T23:12:44.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247082025-03-07T23:12:44.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247092025-03-07T23:12:44.424ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_cumulativeu64
247102025-03-07T23:12:44.426ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 192 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
247112025-03-07T23:12:44.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
247122025-03-07T23:12:44.427ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
247132025-03-07T23:12:44.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247142025-03-07T23:12:44.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247152025-03-07T23:12:44.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247162025-03-07T23:12:44.442ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
247172025-03-07T23:12:44.445ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247182025-03-07T23:12:44.445ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247192025-03-07T23:12:44.445ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247202025-03-07T23:12:44.450ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
247212025-03-07T23:12:44.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
247222025-03-07T23:12:44.454ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247232025-03-07T23:12:44.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247242025-03-07T23:12:44.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247252025-03-07T23:12:44.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247262025-03-07T23:12:44.458ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 192 table_name = measurements_histogramu64
247272025-03-07T23:12:44.460ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
247282025-03-07T23:12:44.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247292025-03-07T23:12:44.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247302025-03-07T23:12:44.464ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247312025-03-07T23:12:44.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247322025-03-07T23:12:44.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247332025-03-07T23:12:44.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247342025-03-07T23:12:44.468ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
247352025-03-07T23:12:44.468ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
247362025-03-07T23:12:44.469ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
247372025-03-07T23:12:44.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247382025-03-07T23:12:44.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247392025-03-07T23:12:44.477ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247402025-03-07T23:12:44.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247412025-03-07T23:12:44.487ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247422025-03-07T23:12:44.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247432025-03-07T23:12:44.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247442025-03-07T23:12:44.488ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247452025-03-07T23:12:44.492ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247462025-03-07T23:12:44.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247472025-03-07T23:12:44.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247482025-03-07T23:12:44.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247492025-03-07T23:12:44.503ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247502025-03-07T23:12:44.503ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247512025-03-07T23:12:44.503ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247522025-03-07T23:12:44.503ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247532025-03-07T23:12:44.506ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247542025-03-07T23:12:44.565ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247552025-03-07T23:12:44.566ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 231066 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3dee848a-90f4-4de0-b3bf-1f39a0e2b296 response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247562025-03-07T23:12:44.567ZINFOtest_unauthorized (external client test context): client received response status = 404
247572025-03-07T23:12:44.568ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247582025-03-07T23:12:44.569ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247592025-03-07T23:12:44.569ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7602297c-c796-4ed9-9c09-8f3e20f8517f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247602025-03-07T23:12:44.569ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7602297c-c796-4ed9-9c09-8f3e20f8517f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247612025-03-07T23:12:44.569ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7602297c-c796-4ed9-9c09-8f3e20f8517f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247622025-03-07T23:12:44.569ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7602297c-c796-4ed9-9c09-8f3e20f8517f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247632025-03-07T23:12:44.570ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1789 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7602297c-c796-4ed9-9c09-8f3e20f8517f response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247642025-03-07T23:12:44.571ZINFOtest_unauthorized (external client test context): client received response status = 401
247652025-03-07T23:12:44.572ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247662025-03-07T23:12:44.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247672025-03-07T23:12:44.584ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f862724-0359-4fb8-ac4e-5dfdd0e91bbe uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247682025-03-07T23:12:44.584ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f862724-0359-4fb8-ac4e-5dfdd0e91bbe uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247692025-03-07T23:12:44.585ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f862724-0359-4fb8-ac4e-5dfdd0e91bbe uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247702025-03-07T23:12:44.585ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 920 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f862724-0359-4fb8-ac4e-5dfdd0e91bbe response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247712025-03-07T23:12:44.585ZINFOtest_unauthorized (external client test context): client received response status = 401
247722025-03-07T23:12:44.586ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247732025-03-07T23:12:44.586ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247742025-03-07T23:12:44.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4f5b0fde-160e-465d-9bc8-8d369a0973b9 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247752025-03-07T23:12:44.596ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4f5b0fde-160e-465d-9bc8-8d369a0973b9 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247762025-03-07T23:12:44.596ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5405:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5420:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4f5b0fde-160e-465d-9bc8-8d369a0973b9 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247772025-03-07T23:12:44.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1313 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 4f5b0fde-160e-465d-9bc8-8d369a0973b9 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247782025-03-07T23:12:44.596ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247792025-03-07T23:12:44.596ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247802025-03-07T23:12:44.596ZINFOtest_unauthorized (external client test context): client received response status = 401
247812025-03-07T23:12:44.596ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247822025-03-07T23:12:44.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247832025-03-07T23:12:44.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a745b105-506a-424d-918a-d43f9f401a0f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247842025-03-07T23:12:44.598ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a745b105-506a-424d-918a-d43f9f401a0f response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247852025-03-07T23:12:44.598ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247862025-03-07T23:12:44.604ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247872025-03-07T23:12:44.604ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247882025-03-07T23:12:44.604ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
247892025-03-07T23:12:44.606ZINFOtest_unauthorized (external client test context): client received response status = 405
247902025-03-07T23:12:44.606ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247912025-03-07T23:12:44.607ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247922025-03-07T23:12:44.609ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4212c38a-ec27-4d36-bb14-d7fd4db651b1 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247932025-03-07T23:12:44.610ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 120 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4212c38a-ec27-4d36-bb14-d7fd4db651b1 response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247942025-03-07T23:12:44.610ZINFOtest_unauthorized (external client test context): client received response status = 405
247952025-03-07T23:12:44.610ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247962025-03-07T23:12:44.610ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247972025-03-07T23:12:44.610ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3cf59282-e11e-4199-a28e-22236970f08e uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247982025-03-07T23:12:44.611ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3cf59282-e11e-4199-a28e-22236970f08e response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247992025-03-07T23:12:44.613ZINFOtest_unauthorized (external client test context): client received response status = 405
248002025-03-07T23:12:44.614ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248012025-03-07T23:12:44.614ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248022025-03-07T23:12:44.617ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e69051f0-1941-4faf-86ec-38eda759325b uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248032025-03-07T23:12:44.617ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 102 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e69051f0-1941-4faf-86ec-38eda759325b response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248042025-03-07T23:12:44.617ZINFOtest_unauthorized (external client test context): client received response status = 405
248052025-03-07T23:12:44.617ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248062025-03-07T23:12:44.617ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248072025-03-07T23:12:44.617ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248082025-03-07T23:12:44.617ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248092025-03-07T23:12:44.620ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248102025-03-07T23:12:44.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248112025-03-07T23:12:44.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248122025-03-07T23:12:44.620ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248132025-03-07T23:12:44.624ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248142025-03-07T23:12:44.627ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248152025-03-07T23:12:44.627ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248162025-03-07T23:12:44.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
248172025-03-07T23:12:44.631ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
248182025-03-07T23:12:44.631ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248192025-03-07T23:12:44.631ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248202025-03-07T23:12:44.633ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248212025-03-07T23:12:44.636ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
248222025-03-07T23:12:44.636ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248232025-03-07T23:12:44.638ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248242025-03-07T23:12:44.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248252025-03-07T23:12:44.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
248262025-03-07T23:12:44.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
248272025-03-07T23:12:44.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248282025-03-07T23:12:44.646ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248292025-03-07T23:12:44.647ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248302025-03-07T23:12:44.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
248312025-03-07T23:12:44.650ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
248322025-03-07T23:12:44.650ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248332025-03-07T23:12:44.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248342025-03-07T23:12:44.650ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248352025-03-07T23:12:44.654ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
248362025-03-07T23:12:44.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248372025-03-07T23:12:44.655ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248382025-03-07T23:12:44.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248392025-03-07T23:12:44.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
248402025-03-07T23:12:44.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
248412025-03-07T23:12:44.661ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248422025-03-07T23:12:44.661ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248432025-03-07T23:12:44.662ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248442025-03-07T23:12:44.663ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248452025-03-07T23:12:44.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248462025-03-07T23:12:44.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248472025-03-07T23:12:44.666ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248482025-03-07T23:12:44.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248492025-03-07T23:12:44.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248502025-03-07T23:12:44.669ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248512025-03-07T23:12:44.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248522025-03-07T23:12:44.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248532025-03-07T23:12:44.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248542025-03-07T23:12:44.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248552025-03-07T23:12:44.675ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248562025-03-07T23:12:44.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248572025-03-07T23:12:44.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248582025-03-07T23:12:44.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248592025-03-07T23:12:44.686ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248602025-03-07T23:12:44.688ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248612025-03-07T23:12:44.689ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248622025-03-07T23:12:44.689ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248632025-03-07T23:12:44.690ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248642025-03-07T23:12:44.690ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248652025-03-07T23:12:44.691ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248662025-03-07T23:12:44.691ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248672025-03-07T23:12:44.697ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248682025-03-07T23:12:44.708ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248692025-03-07T23:12:44.709ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 92571 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d507aa76-5e34-4a91-bcf0-93f68bf48fa2 response_code = 200 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248702025-03-07T23:12:44.709ZINFOtest_unauthorized (external client test context): client received response status = 200
248712025-03-07T23:12:44.709ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248722025-03-07T23:12:44.709ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248732025-03-07T23:12:44.709ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248742025-03-07T23:12:44.711ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248752025-03-07T23:12:44.714ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248762025-03-07T23:12:44.714ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
248772025-03-07T23:12:44.715ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248782025-03-07T23:12:44.715ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248792025-03-07T23:12:44.716ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248802025-03-07T23:12:44.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248812025-03-07T23:12:44.723ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248822025-03-07T23:12:44.723ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248832025-03-07T23:12:44.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
248842025-03-07T23:12:44.727ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
248852025-03-07T23:12:44.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248862025-03-07T23:12:44.729ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248872025-03-07T23:12:44.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248882025-03-07T23:12:44.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
248892025-03-07T23:12:44.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248902025-03-07T23:12:44.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248912025-03-07T23:12:44.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248922025-03-07T23:12:44.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
248932025-03-07T23:12:44.752ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
248942025-03-07T23:12:44.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248952025-03-07T23:12:44.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248962025-03-07T23:12:44.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248972025-03-07T23:12:44.757ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
248982025-03-07T23:12:44.757ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
248992025-03-07T23:12:44.757ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249002025-03-07T23:12:44.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249012025-03-07T23:12:44.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249022025-03-07T23:12:44.771ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249032025-03-07T23:12:44.785ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249042025-03-07T23:12:44.785ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249052025-03-07T23:12:44.786ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249062025-03-07T23:12:44.791ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
249072025-03-07T23:12:44.795ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
249082025-03-07T23:12:44.795ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249092025-03-07T23:12:44.796ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249102025-03-07T23:12:44.796ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249112025-03-07T23:12:44.796ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249122025-03-07T23:12:44.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249132025-03-07T23:12:44.815ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249142025-03-07T23:12:44.816ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249152025-03-07T23:12:44.826ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249162025-03-07T23:12:44.826ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249172025-03-07T23:12:44.827ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249182025-03-07T23:12:44.846ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249192025-03-07T23:12:44.846ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249202025-03-07T23:12:44.847ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249212025-03-07T23:12:44.849ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249222025-03-07T23:12:44.849ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249232025-03-07T23:12:44.849ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249242025-03-07T23:12:44.850ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249252025-03-07T23:12:44.850ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249262025-03-07T23:12:44.853ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249272025-03-07T23:12:44.854ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249282025-03-07T23:12:44.854ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249292025-03-07T23:12:44.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249302025-03-07T23:12:44.859ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249312025-03-07T23:12:44.861ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249322025-03-07T23:12:44.861ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249332025-03-07T23:12:44.861ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249342025-03-07T23:12:44.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249352025-03-07T23:12:44.896ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249362025-03-07T23:12:44.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249372025-03-07T23:12:44.898ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249382025-03-07T23:12:44.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249392025-03-07T23:12:44.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249402025-03-07T23:12:44.898ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249412025-03-07T23:12:44.901ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249422025-03-07T23:12:44.902ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249432025-03-07T23:12:44.902ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249442025-03-07T23:12:44.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249452025-03-07T23:12:44.906ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249462025-03-07T23:12:44.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249472025-03-07T23:12:44.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249482025-03-07T23:12:44.907ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249492025-03-07T23:12:44.912ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249502025-03-07T23:12:44.932ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249512025-03-07T23:12:44.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249522025-03-07T23:12:44.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249532025-03-07T23:12:44.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249542025-03-07T23:12:44.943ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 232530 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e8ef1894-ba0f-4760-bfed-c70c919b491b response_code = 200 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249552025-03-07T23:12:44.945ZINFOtest_unauthorized (external client test context): client received response status = 200
249562025-03-07T23:12:44.945ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249572025-03-07T23:12:44.945ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249582025-03-07T23:12:44.946ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249592025-03-07T23:12:44.946ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249602025-03-07T23:12:44.946ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249612025-03-07T23:12:44.947ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249622025-03-07T23:12:44.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249632025-03-07T23:12:44.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249642025-03-07T23:12:44.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249652025-03-07T23:12:44.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249662025-03-07T23:12:44.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249672025-03-07T23:12:44.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
249682025-03-07T23:12:44.957ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
249692025-03-07T23:12:44.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249702025-03-07T23:12:44.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249712025-03-07T23:12:44.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249722025-03-07T23:12:44.961ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249732025-03-07T23:12:44.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249742025-03-07T23:12:44.961ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249752025-03-07T23:12:44.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249762025-03-07T23:12:44.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
249772025-03-07T23:12:44.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
249782025-03-07T23:12:44.969ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249792025-03-07T23:12:44.970ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249802025-03-07T23:12:44.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249812025-03-07T23:12:44.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
249822025-03-07T23:12:44.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
249832025-03-07T23:12:44.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249842025-03-07T23:12:44.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249852025-03-07T23:12:44.978ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249862025-03-07T23:12:44.980ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249872025-03-07T23:12:44.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249882025-03-07T23:12:44.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249892025-03-07T23:12:44.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249902025-03-07T23:12:44.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
249912025-03-07T23:12:44.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
249922025-03-07T23:12:44.990ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249932025-03-07T23:12:44.991ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249942025-03-07T23:12:44.991ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249952025-03-07T23:12:44.992ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249962025-03-07T23:12:44.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249972025-03-07T23:12:45.000ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249982025-03-07T23:12:45.000ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
249992025-03-07T23:12:45.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250002025-03-07T23:12:45.008ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250012025-03-07T23:12:45.008ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250022025-03-07T23:12:45.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250032025-03-07T23:12:45.008ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250042025-03-07T23:12:45.009ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250052025-03-07T23:12:45.021ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250062025-03-07T23:12:45.021ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250072025-03-07T23:12:45.021ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250082025-03-07T23:12:45.021ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250092025-03-07T23:12:45.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250102025-03-07T23:12:45.026ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250112025-03-07T23:12:45.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250122025-03-07T23:12:45.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250132025-03-07T23:12:45.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250142025-03-07T23:12:45.058ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250152025-03-07T23:12:45.059ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250162025-03-07T23:12:45.060ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250172025-03-07T23:12:45.060ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250182025-03-07T23:12:45.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250192025-03-07T23:12:45.139ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250202025-03-07T23:12:45.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 194988 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6982490d-1650-40d9-aecb-4a322b572d50 response_code = 404 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250212025-03-07T23:12:45.151ZINFOtest_unauthorized (external client test context): client received response status = 404
250222025-03-07T23:12:45.151ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250232025-03-07T23:12:45.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250242025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de1226d1-cfa4-4cf9-aad4-34e68c4b51bd uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250252025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de1226d1-cfa4-4cf9-aad4-34e68c4b51bd uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250262025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de1226d1-cfa4-4cf9-aad4-34e68c4b51bd uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250272025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de1226d1-cfa4-4cf9-aad4-34e68c4b51bd uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250282025-03-07T23:12:45.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 367 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = de1226d1-cfa4-4cf9-aad4-34e68c4b51bd response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250292025-03-07T23:12:45.151ZINFOtest_unauthorized (external client test context): client received response status = 401
250302025-03-07T23:12:45.151ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250312025-03-07T23:12:45.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250322025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 050d12bb-8dc7-47b0-89bd-436f54dab8b7 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250332025-03-07T23:12:45.151ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 050d12bb-8dc7-47b0-89bd-436f54dab8b7 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250342025-03-07T23:12:45.152ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 050d12bb-8dc7-47b0-89bd-436f54dab8b7 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250352025-03-07T23:12:45.152ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 245 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 050d12bb-8dc7-47b0-89bd-436f54dab8b7 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250362025-03-07T23:12:45.152ZINFOtest_unauthorized (external client test context): client received response status = 401
250372025-03-07T23:12:45.152ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250382025-03-07T23:12:45.152ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250392025-03-07T23:12:45.152ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c7af2c79-3c57-4ccf-b5c7-320eed8a0779 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250402025-03-07T23:12:45.152ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c7af2c79-3c57-4ccf-b5c7-320eed8a0779 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250412025-03-07T23:12:45.152ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5463:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5487:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c7af2c79-3c57-4ccf-b5c7-320eed8a0779 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250422025-03-07T23:12:45.152ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1693 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c7af2c79-3c57-4ccf-b5c7-320eed8a0779 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250432025-03-07T23:12:45.152ZINFOtest_unauthorized (external client test context): client received response status = 401
250442025-03-07T23:12:45.152ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250452025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250462025-03-07T23:12:45.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d1577b0f-1420-43cd-a323-9a85c31bc605 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250472025-03-07T23:12:45.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d1577b0f-1420-43cd-a323-9a85c31bc605 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250482025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client received response status = 405
250492025-03-07T23:12:45.153ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250502025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250512025-03-07T23:12:45.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93b562d1-d9fb-4ab4-813b-0d9d33425a90 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250522025-03-07T23:12:45.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93b562d1-d9fb-4ab4-813b-0d9d33425a90 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250532025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client received response status = 405
250542025-03-07T23:12:45.153ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250552025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250562025-03-07T23:12:45.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = df6722df-197e-4a23-8cfd-aaba6bbcfae9 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250572025-03-07T23:12:45.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = df6722df-197e-4a23-8cfd-aaba6bbcfae9 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250582025-03-07T23:12:45.153ZINFOtest_unauthorized (external client test context): client received response status = 405
250592025-03-07T23:12:45.154ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250602025-03-07T23:12:45.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250612025-03-07T23:12:45.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9b113e2-34ed-4c77-a8c6-a9fe39211066 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250622025-03-07T23:12:45.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9b113e2-34ed-4c77-a8c6-a9fe39211066 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250632025-03-07T23:12:45.154ZINFOtest_unauthorized (external client test context): client received response status = 405
250642025-03-07T23:12:45.154ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250652025-03-07T23:12:45.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250662025-03-07T23:12:45.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250672025-03-07T23:12:45.154ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250682025-03-07T23:12:45.154ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
250692025-03-07T23:12:45.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250702025-03-07T23:12:45.154ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250712025-03-07T23:12:45.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250722025-03-07T23:12:45.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250732025-03-07T23:12:45.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250742025-03-07T23:12:45.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250752025-03-07T23:12:45.166ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
250762025-03-07T23:12:45.167ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
250772025-03-07T23:12:45.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250782025-03-07T23:12:45.167ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250792025-03-07T23:12:45.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250802025-03-07T23:12:45.181ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250812025-03-07T23:12:45.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250822025-03-07T23:12:45.181ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250832025-03-07T23:12:45.184ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250842025-03-07T23:12:45.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
250852025-03-07T23:12:45.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
250862025-03-07T23:12:45.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250872025-03-07T23:12:45.222ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250882025-03-07T23:12:45.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250892025-03-07T23:12:45.224ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
250902025-03-07T23:12:45.224ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
250912025-03-07T23:12:45.224ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
250922025-03-07T23:12:45.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
250932025-03-07T23:12:45.227ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
250942025-03-07T23:12:45.228ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
250952025-03-07T23:12:45.228ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
250962025-03-07T23:12:45.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
250972025-03-07T23:12:45.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
250982025-03-07T23:12:45.230ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
250992025-03-07T23:12:45.230ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
251002025-03-07T23:12:45.232ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
251012025-03-07T23:12:45.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
251022025-03-07T23:12:45.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
251032025-03-07T23:12:45.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
251042025-03-07T23:12:45.242ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
251052025-03-07T23:12:45.243ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
251062025-03-07T23:12:45.245ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
251072025-03-07T23:12:45.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
251082025-03-07T23:12:45.267ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251092025-03-07T23:12:45.267ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251102025-03-07T23:12:45.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251112025-03-07T23:12:45.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251122025-03-07T23:12:45.267ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251132025-03-07T23:12:45.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251142025-03-07T23:12:45.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251152025-03-07T23:12:45.275ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251162025-03-07T23:12:45.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251172025-03-07T23:12:45.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251182025-03-07T23:12:45.284ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251192025-03-07T23:12:45.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251202025-03-07T23:12:45.285ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251212025-03-07T23:12:45.289ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251222025-03-07T23:12:45.294ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251232025-03-07T23:12:45.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251242025-03-07T23:12:45.294ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251252025-03-07T23:12:45.294ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251262025-03-07T23:12:45.295ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251272025-03-07T23:12:45.295ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251282025-03-07T23:12:45.296ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251292025-03-07T23:12:45.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251302025-03-07T23:12:45.307ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251312025-03-07T23:12:45.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251322025-03-07T23:12:45.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251332025-03-07T23:12:45.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251342025-03-07T23:12:45.311ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251352025-03-07T23:12:45.370ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251362025-03-07T23:12:45.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 223715 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ab3832f7-d5b5-4360-a8af-29fa77999ab9 response_code = 404 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251372025-03-07T23:12:45.376ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
251382025-03-07T23:12:45.376ZINFOtest_unauthorized (external client test context): client received response status = 404
251392025-03-07T23:12:45.376ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251402025-03-07T23:12:45.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251412025-03-07T23:12:45.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b8019fe9-234c-4533-ae2a-713a7de3b279 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251422025-03-07T23:12:45.376ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b8019fe9-234c-4533-ae2a-713a7de3b279 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251432025-03-07T23:12:45.376ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b8019fe9-234c-4533-ae2a-713a7de3b279 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251442025-03-07T23:12:45.376ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b8019fe9-234c-4533-ae2a-713a7de3b279 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251452025-03-07T23:12:45.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 549 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b8019fe9-234c-4533-ae2a-713a7de3b279 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251462025-03-07T23:12:45.377ZINFOtest_unauthorized (external client test context): client received response status = 401
251472025-03-07T23:12:45.377ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251482025-03-07T23:12:45.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251492025-03-07T23:12:45.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0706bc47-5c2b-421d-9012-ce7957aa72e1 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251502025-03-07T23:12:45.377ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0706bc47-5c2b-421d-9012-ce7957aa72e1 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251512025-03-07T23:12:45.377ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0706bc47-5c2b-421d-9012-ce7957aa72e1 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251522025-03-07T23:12:45.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 307 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0706bc47-5c2b-421d-9012-ce7957aa72e1 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251532025-03-07T23:12:45.377ZINFOtest_unauthorized (external client test context): client received response status = 401
251542025-03-07T23:12:45.377ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251552025-03-07T23:12:45.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251562025-03-07T23:12:45.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0b6beabc-1e24-4a1d-a22c-29a0d4514121 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251572025-03-07T23:12:45.377ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0b6beabc-1e24-4a1d-a22c-29a0d4514121 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251582025-03-07T23:12:45.378ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5531:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5550:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0b6beabc-1e24-4a1d-a22c-29a0d4514121 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251592025-03-07T23:12:45.378ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2117 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0b6beabc-1e24-4a1d-a22c-29a0d4514121 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251602025-03-07T23:12:45.378ZINFOtest_unauthorized (external client test context): client received response status = 401
251612025-03-07T23:12:45.383ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251622025-03-07T23:12:45.383ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251632025-03-07T23:12:45.383ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2fe85e1-59a0-4bb0-b2c1-55db4e90e8ce uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251642025-03-07T23:12:45.383ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b2fe85e1-59a0-4bb0-b2c1-55db4e90e8ce response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251652025-03-07T23:12:45.383ZINFOtest_unauthorized (external client test context): client received response status = 405
251662025-03-07T23:12:45.383ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251672025-03-07T23:12:45.383ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251682025-03-07T23:12:45.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d879f68f-5f67-4a19-9995-0d7a74d443c8 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251692025-03-07T23:12:45.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d879f68f-5f67-4a19-9995-0d7a74d443c8 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251702025-03-07T23:12:45.384ZINFOtest_unauthorized (external client test context): client received response status = 405
251712025-03-07T23:12:45.384ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251722025-03-07T23:12:45.384ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251732025-03-07T23:12:45.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 367bd820-cb50-4889-b40d-a431a2f985af uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251742025-03-07T23:12:45.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 367bd820-cb50-4889-b40d-a431a2f985af response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251752025-03-07T23:12:45.384ZINFOtest_unauthorized (external client test context): client received response status = 405
251762025-03-07T23:12:45.384ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251772025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251782025-03-07T23:12:45.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 816cac2d-3318-46b9-95c6-a00fb331733d uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251792025-03-07T23:12:45.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 816cac2d-3318-46b9-95c6-a00fb331733d response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251802025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client received response status = 405
251812025-03-07T23:12:45.386ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251822025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251832025-03-07T23:12:45.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ebac6d56-4116-49c5-86b9-990cca0a57e9 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251842025-03-07T23:12:45.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ebac6d56-4116-49c5-86b9-990cca0a57e9 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251852025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client received response status = 405
251862025-03-07T23:12:45.386ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251872025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251882025-03-07T23:12:45.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eeaff531-4aea-4af3-af3b-37d231750316 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251892025-03-07T23:12:45.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eeaff531-4aea-4af3-af3b-37d231750316 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251902025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client received response status = 405
251912025-03-07T23:12:45.386ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251922025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251932025-03-07T23:12:45.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e31c3aba-4896-4a3d-a797-b1e050b2c00f uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251942025-03-07T23:12:45.386ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e31c3aba-4896-4a3d-a797-b1e050b2c00f response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251952025-03-07T23:12:45.386ZINFOtest_unauthorized (external client test context): client received response status = 405
251962025-03-07T23:12:45.386ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251972025-03-07T23:12:45.387ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251982025-03-07T23:12:45.387ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cccd964e-2c18-4fe5-a583-2d8b06673a82 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
251992025-03-07T23:12:45.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cccd964e-2c18-4fe5-a583-2d8b06673a82 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252002025-03-07T23:12:45.387ZINFOtest_unauthorized (external client test context): client received response status = 405
252012025-03-07T23:12:45.387ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252022025-03-07T23:12:45.387ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252032025-03-07T23:12:45.387ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252042025-03-07T23:12:45.387ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252052025-03-07T23:12:45.387ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252062025-03-07T23:12:45.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252072025-03-07T23:12:45.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252082025-03-07T23:12:45.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252092025-03-07T23:12:45.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252102025-03-07T23:12:45.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252112025-03-07T23:12:45.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252122025-03-07T23:12:45.394ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
252132025-03-07T23:12:45.395ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
252142025-03-07T23:12:45.395ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252152025-03-07T23:12:45.395ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252162025-03-07T23:12:45.400ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252172025-03-07T23:12:45.406ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252182025-03-07T23:12:45.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252192025-03-07T23:12:45.407ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252202025-03-07T23:12:45.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252212025-03-07T23:12:45.411ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
252222025-03-07T23:12:45.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
252232025-03-07T23:12:45.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252242025-03-07T23:12:45.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252252025-03-07T23:12:45.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252262025-03-07T23:12:45.420ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
252272025-03-07T23:12:45.420ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
252282025-03-07T23:12:45.420ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252292025-03-07T23:12:45.420ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252302025-03-07T23:12:45.423ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252312025-03-07T23:12:45.459ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252322025-03-07T23:12:45.459ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252332025-03-07T23:12:45.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252342025-03-07T23:12:45.464ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252352025-03-07T23:12:45.472ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
252362025-03-07T23:12:45.472ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
252372025-03-07T23:12:45.472ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252382025-03-07T23:12:45.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252392025-03-07T23:12:45.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252402025-03-07T23:12:45.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252412025-03-07T23:12:45.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252422025-03-07T23:12:45.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252432025-03-07T23:12:45.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252442025-03-07T23:12:45.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252452025-03-07T23:12:45.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252462025-03-07T23:12:45.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252472025-03-07T23:12:45.499ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252482025-03-07T23:12:45.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252492025-03-07T23:12:45.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252502025-03-07T23:12:45.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252512025-03-07T23:12:45.506ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252522025-03-07T23:12:45.506ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252532025-03-07T23:12:45.506ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252542025-03-07T23:12:45.506ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252552025-03-07T23:12:45.508ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252562025-03-07T23:12:45.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252572025-03-07T23:12:45.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252582025-03-07T23:12:45.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252592025-03-07T23:12:45.512ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252602025-03-07T23:12:45.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252612025-03-07T23:12:45.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252622025-03-07T23:12:45.514ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252632025-03-07T23:12:45.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252642025-03-07T23:12:45.555ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252652025-03-07T23:12:45.557ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252662025-03-07T23:12:45.557ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252672025-03-07T23:12:45.557ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252682025-03-07T23:12:45.558ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252692025-03-07T23:12:45.561ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252702025-03-07T23:12:45.567ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252712025-03-07T23:12:45.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252722025-03-07T23:12:45.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252732025-03-07T23:12:45.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252742025-03-07T23:12:45.579ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
252752025-03-07T23:12:45.579ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252762025-03-07T23:12:45.580ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252772025-03-07T23:12:45.580ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252782025-03-07T23:12:45.580ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252792025-03-07T23:12:45.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252802025-03-07T23:12:45.580ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29d9d278-2fef-4b16-926a-d86d679f38c7 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252812025-03-07T23:12:45.580ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29d9d278-2fef-4b16-926a-d86d679f38c7 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252822025-03-07T23:12:45.580ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29d9d278-2fef-4b16-926a-d86d679f38c7 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252832025-03-07T23:12:45.580ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29d9d278-2fef-4b16-926a-d86d679f38c7 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252842025-03-07T23:12:45.580ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252852025-03-07T23:12:45.611ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252862025-03-07T23:12:45.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252872025-03-07T23:12:45.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252882025-03-07T23:12:45.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
252892025-03-07T23:12:45.619ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252902025-03-07T23:12:45.619ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252912025-03-07T23:12:45.621ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252922025-03-07T23:12:45.631ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252932025-03-07T23:12:45.632ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252942025-03-07T23:12:45.633ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
252952025-03-07T23:12:45.633ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 57516 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 29d9d278-2fef-4b16-926a-d86d679f38c7 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252962025-03-07T23:12:45.634ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "29d9d278-2fef-4b16-926a-d86d679f38c7", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:45 GMT"} })
252972025-03-07T23:12:45.634ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
252982025-03-07T23:12:45.634ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d0ae46e9-62d9-4eb9-8114-2da2d73bae48 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
252992025-03-07T23:12:45.635ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d0ae46e9-62d9-4eb9-8114-2da2d73bae48 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
253002025-03-07T23:12:45.635ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d0ae46e9-62d9-4eb9-8114-2da2d73bae48 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
253012025-03-07T23:12:45.639ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d0ae46e9-62d9-4eb9-8114-2da2d73bae48 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
253022025-03-07T23:12:45.639ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 258511 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 912e7440-da8c-4fb0-8ce4-d4824fcd3a6f response_code = 200 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253032025-03-07T23:12:45.640ZINFOtest_unauthorized (external client test context): client received response status = 200
253042025-03-07T23:12:45.642ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253052025-03-07T23:12:45.642ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253062025-03-07T23:12:45.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253072025-03-07T23:12:45.642ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253082025-03-07T23:12:45.642ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253092025-03-07T23:12:45.642ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253102025-03-07T23:12:45.643ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253112025-03-07T23:12:45.643ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253122025-03-07T23:12:45.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253132025-03-07T23:12:45.648ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 13388 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = d0ae46e9-62d9-4eb9-8114-2da2d73bae48 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
253142025-03-07T23:12:45.649ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d0ae46e9-62d9-4eb9-8114-2da2d73bae48", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:45 GMT"} })
253152025-03-07T23:12:45.649ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
253162025-03-07T23:12:45.649ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
253172025-03-07T23:12:45.649ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
253182025-03-07T23:12:45.650ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253192025-03-07T23:12:45.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253202025-03-07T23:12:45.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253212025-03-07T23:12:45.654ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
253222025-03-07T23:12:45.654ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
253232025-03-07T23:12:45.654ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253242025-03-07T23:12:45.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253252025-03-07T23:12:45.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253262025-03-07T23:12:45.666ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253272025-03-07T23:12:45.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253282025-03-07T23:12:45.667ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253292025-03-07T23:12:45.671ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253302025-03-07T23:12:45.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
253312025-03-07T23:12:45.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
253322025-03-07T23:12:45.683ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253332025-03-07T23:12:45.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253342025-03-07T23:12:45.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253352025-03-07T23:12:45.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
253362025-03-07T23:12:45.686ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
253372025-03-07T23:12:45.688ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253382025-03-07T23:12:45.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253392025-03-07T23:12:45.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253402025-03-07T23:12:45.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253412025-03-07T23:12:45.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253422025-03-07T23:12:45.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253432025-03-07T23:12:45.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253442025-03-07T23:12:45.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
253452025-03-07T23:12:45.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
253462025-03-07T23:12:45.710ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253472025-03-07T23:12:45.711ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253482025-03-07T23:12:45.711ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253492025-03-07T23:12:45.712ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253502025-03-07T23:12:45.717ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253512025-03-07T23:12:45.718ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253522025-03-07T23:12:45.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253532025-03-07T23:12:45.730ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253542025-03-07T23:12:45.730ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253552025-03-07T23:12:45.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253562025-03-07T23:12:45.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253572025-03-07T23:12:45.731ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253582025-03-07T23:12:45.732ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253592025-03-07T23:12:45.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253602025-03-07T23:12:45.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253612025-03-07T23:12:45.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253622025-03-07T23:12:45.743ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253632025-03-07T23:12:45.743ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253642025-03-07T23:12:45.743ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253652025-03-07T23:12:45.743ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253662025-03-07T23:12:45.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253672025-03-07T23:12:45.749ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253682025-03-07T23:12:45.749ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253692025-03-07T23:12:45.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253702025-03-07T23:12:45.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253712025-03-07T23:12:45.755ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253722025-03-07T23:12:45.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253732025-03-07T23:12:45.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253742025-03-07T23:12:45.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253752025-03-07T23:12:45.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253762025-03-07T23:12:45.802ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253772025-03-07T23:12:45.804ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 162071 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 08c5ae15-5c81-47a9-9ea9-fbb07d8c175b response_code = 200 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253782025-03-07T23:12:45.804ZINFOtest_unauthorized (external client test context): client received response status = 200
253792025-03-07T23:12:45.805ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253802025-03-07T23:12:45.806ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253812025-03-07T23:12:45.817ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253822025-03-07T23:12:45.818ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253832025-03-07T23:12:45.819ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
253842025-03-07T23:12:45.819ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253852025-03-07T23:12:45.819ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253862025-03-07T23:12:45.821ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253872025-03-07T23:12:45.831ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253882025-03-07T23:12:45.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253892025-03-07T23:12:45.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253902025-03-07T23:12:45.867ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
253912025-03-07T23:12:45.867ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
253922025-03-07T23:12:45.867ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253932025-03-07T23:12:45.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253942025-03-07T23:12:45.870ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253952025-03-07T23:12:45.907ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253962025-03-07T23:12:45.907ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253972025-03-07T23:12:45.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253982025-03-07T23:12:45.909ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253992025-03-07T23:12:45.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
254002025-03-07T23:12:45.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
254012025-03-07T23:12:45.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254022025-03-07T23:12:45.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254032025-03-07T23:12:45.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254042025-03-07T23:12:45.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
254052025-03-07T23:12:45.957ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
254062025-03-07T23:12:45.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254072025-03-07T23:12:45.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254082025-03-07T23:12:45.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254092025-03-07T23:12:45.959ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
254102025-03-07T23:12:45.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254112025-03-07T23:12:45.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254122025-03-07T23:12:45.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254132025-03-07T23:12:45.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
254142025-03-07T23:12:45.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
254152025-03-07T23:12:45.966ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254162025-03-07T23:12:45.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254172025-03-07T23:12:45.967ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254182025-03-07T23:12:45.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254192025-03-07T23:12:45.974ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254202025-03-07T23:12:45.974ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254212025-03-07T23:12:45.975ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254222025-03-07T23:12:45.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254232025-03-07T23:12:45.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254242025-03-07T23:12:45.980ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254252025-03-07T23:12:45.983ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254262025-03-07T23:12:45.983ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254272025-03-07T23:12:45.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254282025-03-07T23:12:45.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254292025-03-07T23:12:45.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254302025-03-07T23:12:45.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254312025-03-07T23:12:45.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254322025-03-07T23:12:45.995ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254332025-03-07T23:12:45.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254342025-03-07T23:12:45.995ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254352025-03-07T23:12:45.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254362025-03-07T23:12:45.999ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254372025-03-07T23:12:46.000ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254382025-03-07T23:12:46.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254392025-03-07T23:12:46.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254402025-03-07T23:12:46.005ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254412025-03-07T23:12:46.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254422025-03-07T23:12:46.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254432025-03-07T23:12:46.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254442025-03-07T23:12:46.011ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254452025-03-07T23:12:46.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254462025-03-07T23:12:46.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 215588 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 75657b33-4be4-4a09-8bc1-13a295139898 response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254472025-03-07T23:12:46.033ZINFOtest_unauthorized (external client test context): client received response status = 404
254482025-03-07T23:12:46.034ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254492025-03-07T23:12:46.034ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254502025-03-07T23:12:46.034ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52ba9b6-c940-4226-9657-e209ca360fc3 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254512025-03-07T23:12:46.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52ba9b6-c940-4226-9657-e209ca360fc3 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254522025-03-07T23:12:46.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52ba9b6-c940-4226-9657-e209ca360fc3 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254532025-03-07T23:12:46.034ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52ba9b6-c940-4226-9657-e209ca360fc3 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254542025-03-07T23:12:46.035ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 477 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a52ba9b6-c940-4226-9657-e209ca360fc3 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254552025-03-07T23:12:46.043ZINFOtest_unauthorized (external client test context): client received response status = 401
254562025-03-07T23:12:46.043ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254572025-03-07T23:12:46.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254582025-03-07T23:12:46.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 65b183e5-86bd-4d42-80fd-2e793137d1d1 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254592025-03-07T23:12:46.044ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 65b183e5-86bd-4d42-80fd-2e793137d1d1 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254602025-03-07T23:12:46.044ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 65b183e5-86bd-4d42-80fd-2e793137d1d1 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254612025-03-07T23:12:46.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 375 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 65b183e5-86bd-4d42-80fd-2e793137d1d1 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254622025-03-07T23:12:46.044ZINFOtest_unauthorized (external client test context): client received response status = 401
254632025-03-07T23:12:46.044ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254642025-03-07T23:12:46.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254652025-03-07T23:12:46.045ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2baaeb5-0c51-433a-a8e1-f2dc32f9837f uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254662025-03-07T23:12:46.045ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2baaeb5-0c51-433a-a8e1-f2dc32f9837f uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254672025-03-07T23:12:46.046ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5500:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5520:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2baaeb5-0c51-433a-a8e1-f2dc32f9837f uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254682025-03-07T23:12:46.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 904 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2baaeb5-0c51-433a-a8e1-f2dc32f9837f response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254692025-03-07T23:12:46.046ZINFOtest_unauthorized (external client test context): client received response status = 401
254702025-03-07T23:12:46.046ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254712025-03-07T23:12:46.046ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254722025-03-07T23:12:46.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254732025-03-07T23:12:46.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254742025-03-07T23:12:46.048ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254752025-03-07T23:12:46.048ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254762025-03-07T23:12:46.048ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254772025-03-07T23:12:46.052ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254782025-03-07T23:12:46.056ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254792025-03-07T23:12:46.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254802025-03-07T23:12:46.057ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254812025-03-07T23:12:46.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
254822025-03-07T23:12:46.060ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
254832025-03-07T23:12:46.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254842025-03-07T23:12:46.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254852025-03-07T23:12:46.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254862025-03-07T23:12:46.063ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
254872025-03-07T23:12:46.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254882025-03-07T23:12:46.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254892025-03-07T23:12:46.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254902025-03-07T23:12:46.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
254912025-03-07T23:12:46.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
254922025-03-07T23:12:46.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254932025-03-07T23:12:46.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254942025-03-07T23:12:46.074ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254952025-03-07T23:12:46.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
254962025-03-07T23:12:46.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
254972025-03-07T23:12:46.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254982025-03-07T23:12:46.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254992025-03-07T23:12:46.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255002025-03-07T23:12:46.082ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
255012025-03-07T23:12:46.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255022025-03-07T23:12:46.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255032025-03-07T23:12:46.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255042025-03-07T23:12:46.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
255052025-03-07T23:12:46.092ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
255062025-03-07T23:12:46.092ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255072025-03-07T23:12:46.092ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255082025-03-07T23:12:46.092ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255092025-03-07T23:12:46.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255102025-03-07T23:12:46.098ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255112025-03-07T23:12:46.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255122025-03-07T23:12:46.100ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255132025-03-07T23:12:46.118ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255142025-03-07T23:12:46.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255152025-03-07T23:12:46.120ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255162025-03-07T23:12:46.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255172025-03-07T23:12:46.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255182025-03-07T23:12:46.126ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255192025-03-07T23:12:46.135ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255202025-03-07T23:12:46.135ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255212025-03-07T23:12:46.136ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255222025-03-07T23:12:46.144ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255232025-03-07T23:12:46.145ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255242025-03-07T23:12:46.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255252025-03-07T23:12:46.145ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255262025-03-07T23:12:46.146ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255272025-03-07T23:12:46.151ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255282025-03-07T23:12:46.151ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255292025-03-07T23:12:46.151ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255302025-03-07T23:12:46.153ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255312025-03-07T23:12:46.157ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255322025-03-07T23:12:46.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255332025-03-07T23:12:46.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255342025-03-07T23:12:46.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255352025-03-07T23:12:46.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255362025-03-07T23:12:46.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255372025-03-07T23:12:46.200ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 151864 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a829070-be88-47d4-b6ca-71ef50129205 response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255382025-03-07T23:12:46.200ZINFOtest_unauthorized (external client test context): client received response status = 404
255392025-03-07T23:12:46.200ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255402025-03-07T23:12:46.200ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255412025-03-07T23:12:46.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a2fcbd2-1e49-4c7d-a5dd-e143fd2ae5bf uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255422025-03-07T23:12:46.202ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a2fcbd2-1e49-4c7d-a5dd-e143fd2ae5bf uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255432025-03-07T23:12:46.202ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a2fcbd2-1e49-4c7d-a5dd-e143fd2ae5bf uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255442025-03-07T23:12:46.202ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a2fcbd2-1e49-4c7d-a5dd-e143fd2ae5bf uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255452025-03-07T23:12:46.202ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 640 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a2fcbd2-1e49-4c7d-a5dd-e143fd2ae5bf response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255462025-03-07T23:12:46.204ZINFOtest_unauthorized (external client test context): client received response status = 401
255472025-03-07T23:12:46.204ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255482025-03-07T23:12:46.204ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255492025-03-07T23:12:46.205ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e75186b4-048f-484d-9ba1-d8d9f3800eec uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255502025-03-07T23:12:46.205ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e75186b4-048f-484d-9ba1-d8d9f3800eec uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255512025-03-07T23:12:46.205ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e75186b4-048f-484d-9ba1-d8d9f3800eec uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255522025-03-07T23:12:46.205ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 403 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e75186b4-048f-484d-9ba1-d8d9f3800eec response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255532025-03-07T23:12:46.206ZINFOtest_unauthorized (external client test context): client received response status = 401
255542025-03-07T23:12:46.206ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255552025-03-07T23:12:46.206ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255562025-03-07T23:12:46.206ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9bccbaf2-818f-4b71-85bf-efe45ae6d694 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255572025-03-07T23:12:46.207ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9bccbaf2-818f-4b71-85bf-efe45ae6d694 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255582025-03-07T23:12:46.208ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5596:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5614:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9bccbaf2-818f-4b71-85bf-efe45ae6d694 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255592025-03-07T23:12:46.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1794 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9bccbaf2-818f-4b71-85bf-efe45ae6d694 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255602025-03-07T23:12:46.209ZINFOtest_unauthorized (external client test context): client received response status = 401
255612025-03-07T23:12:46.209ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255622025-03-07T23:12:46.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255632025-03-07T23:12:46.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cba82bc0-028f-4a8e-9915-1839ec3922d9 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255642025-03-07T23:12:46.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cba82bc0-028f-4a8e-9915-1839ec3922d9 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255652025-03-07T23:12:46.210ZINFOtest_unauthorized (external client test context): client received response status = 405
255662025-03-07T23:12:46.210ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255672025-03-07T23:12:46.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255682025-03-07T23:12:46.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 52de4d99-56c7-4ab3-a9cf-f6bac01db36c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255692025-03-07T23:12:46.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 52de4d99-56c7-4ab3-a9cf-f6bac01db36c response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255702025-03-07T23:12:46.216ZINFOtest_unauthorized (external client test context): client received response status = 405
255712025-03-07T23:12:46.216ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255722025-03-07T23:12:46.216ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255732025-03-07T23:12:46.217ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 86e8c101-a507-4196-9f5d-9f8d8cba4e10 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255742025-03-07T23:12:46.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 237 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 86e8c101-a507-4196-9f5d-9f8d8cba4e10 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255752025-03-07T23:12:46.217ZINFOtest_unauthorized (external client test context): client received response status = 405
255762025-03-07T23:12:46.218ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255772025-03-07T23:12:46.218ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255782025-03-07T23:12:46.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44376563-5731-4229-a8fc-44594c97b70a uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255792025-03-07T23:12:46.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44376563-5731-4229-a8fc-44594c97b70a response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255802025-03-07T23:12:46.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
255812025-03-07T23:12:46.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
255822025-03-07T23:12:46.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
255832025-03-07T23:12:46.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
255842025-03-07T23:12:46.222ZINFOtest_unauthorized (external client test context): client received response status = 405
255852025-03-07T23:12:46.224ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255862025-03-07T23:12:46.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255872025-03-07T23:12:46.225ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255882025-03-07T23:12:46.226ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255892025-03-07T23:12:46.226ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255902025-03-07T23:12:46.226ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255912025-03-07T23:12:46.226ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255922025-03-07T23:12:46.227ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255932025-03-07T23:12:46.251ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
255942025-03-07T23:12:46.252ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
255952025-03-07T23:12:46.255ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255962025-03-07T23:12:46.256ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255972025-03-07T23:12:46.258ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255982025-03-07T23:12:46.261ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
255992025-03-07T23:12:46.263ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
256002025-03-07T23:12:46.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
256012025-03-07T23:12:46.264ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
256022025-03-07T23:12:46.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256032025-03-07T23:12:46.265ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256042025-03-07T23:12:46.266ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256052025-03-07T23:12:46.269ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
256062025-03-07T23:12:46.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256072025-03-07T23:12:46.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256082025-03-07T23:12:46.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256092025-03-07T23:12:46.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
256102025-03-07T23:12:46.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
256112025-03-07T23:12:46.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256122025-03-07T23:12:46.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256132025-03-07T23:12:46.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256142025-03-07T23:12:46.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
256152025-03-07T23:12:46.282ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
256162025-03-07T23:12:46.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256172025-03-07T23:12:46.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256182025-03-07T23:12:46.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256192025-03-07T23:12:46.289ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
256202025-03-07T23:12:46.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256212025-03-07T23:12:46.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256222025-03-07T23:12:46.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256232025-03-07T23:12:46.299ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
256242025-03-07T23:12:46.299ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
256252025-03-07T23:12:46.299ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
256262025-03-07T23:12:46.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
256272025-03-07T23:12:46.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
256282025-03-07T23:12:46.309ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256292025-03-07T23:12:46.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256302025-03-07T23:12:46.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256312025-03-07T23:12:46.312ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256322025-03-07T23:12:46.317ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256332025-03-07T23:12:46.317ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256342025-03-07T23:12:46.318ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256352025-03-07T23:12:46.321ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
256362025-03-07T23:12:46.321ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
256372025-03-07T23:12:46.321ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
256382025-03-07T23:12:46.321ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
256392025-03-07T23:12:46.321ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
256402025-03-07T23:12:46.322ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
256412025-03-07T23:12:46.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
256422025-03-07T23:12:46.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256432025-03-07T23:12:46.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256442025-03-07T23:12:46.323ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256452025-03-07T23:12:46.329ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256462025-03-07T23:12:46.329ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256472025-03-07T23:12:46.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256482025-03-07T23:12:46.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256492025-03-07T23:12:46.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256502025-03-07T23:12:46.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256512025-03-07T23:12:46.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256522025-03-07T23:12:46.346ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256532025-03-07T23:12:46.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256542025-03-07T23:12:46.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256552025-03-07T23:12:46.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256562025-03-07T23:12:46.370ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256572025-03-07T23:12:46.384ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256582025-03-07T23:12:46.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256592025-03-07T23:12:46.385ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256602025-03-07T23:12:46.385ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256612025-03-07T23:12:46.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256622025-03-07T23:12:46.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256632025-03-07T23:12:46.385ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256642025-03-07T23:12:46.392ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256652025-03-07T23:12:46.424ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256662025-03-07T23:12:46.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 206048 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e035a39b-b52a-41fd-82d4-633e56dc490e response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256672025-03-07T23:12:46.440ZINFOtest_unauthorized (external client test context): client received response status = 404
256682025-03-07T23:12:46.441ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256692025-03-07T23:12:46.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256702025-03-07T23:12:46.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43796f10-b934-48be-87d4-1d67eb85803c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256712025-03-07T23:12:46.441ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43796f10-b934-48be-87d4-1d67eb85803c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256722025-03-07T23:12:46.441ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43796f10-b934-48be-87d4-1d67eb85803c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256732025-03-07T23:12:46.442ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43796f10-b934-48be-87d4-1d67eb85803c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256742025-03-07T23:12:46.442ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 384 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43796f10-b934-48be-87d4-1d67eb85803c response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256752025-03-07T23:12:46.442ZINFOtest_unauthorized (external client test context): client received response status = 401
256762025-03-07T23:12:46.442ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256772025-03-07T23:12:46.442ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256782025-03-07T23:12:46.443ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0f1f1a1f-65b3-4572-88d9-06577fca797b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256792025-03-07T23:12:46.443ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0f1f1a1f-65b3-4572-88d9-06577fca797b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256802025-03-07T23:12:46.443ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0f1f1a1f-65b3-4572-88d9-06577fca797b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256812025-03-07T23:12:46.443ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 569 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0f1f1a1f-65b3-4572-88d9-06577fca797b response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256822025-03-07T23:12:46.444ZINFOtest_unauthorized (external client test context): client received response status = 401
256832025-03-07T23:12:46.444ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256842025-03-07T23:12:46.444ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256852025-03-07T23:12:46.444ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1fff18b-eabd-4366-9ea1-2ce0820aaf42 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256862025-03-07T23:12:46.444ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1fff18b-eabd-4366-9ea1-2ce0820aaf42 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256872025-03-07T23:12:46.445ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5561:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5580:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1fff18b-eabd-4366-9ea1-2ce0820aaf42 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256882025-03-07T23:12:46.446ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1702 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e1fff18b-eabd-4366-9ea1-2ce0820aaf42 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256892025-03-07T23:12:46.446ZINFOtest_unauthorized (external client test context): client received response status = 401
256902025-03-07T23:12:46.446ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256912025-03-07T23:12:46.446ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256922025-03-07T23:12:46.446ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d204bf31-4f42-487a-8457-f96ab5ee1f93 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256932025-03-07T23:12:46.447ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 211 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d204bf31-4f42-487a-8457-f96ab5ee1f93 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256942025-03-07T23:12:46.447ZINFOtest_unauthorized (external client test context): client received response status = 405
256952025-03-07T23:12:46.449ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256962025-03-07T23:12:46.449ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256972025-03-07T23:12:46.449ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0d079a2e-4ca3-4eec-8e5a-29eabd043edf uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256982025-03-07T23:12:46.449ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0d079a2e-4ca3-4eec-8e5a-29eabd043edf response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256992025-03-07T23:12:46.449ZINFOtest_unauthorized (external client test context): client received response status = 405
257002025-03-07T23:12:46.449ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257012025-03-07T23:12:46.449ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257022025-03-07T23:12:46.449ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3469d0ef-05d7-42e2-b981-c310eb293c79 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257032025-03-07T23:12:46.449ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3469d0ef-05d7-42e2-b981-c310eb293c79 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257042025-03-07T23:12:46.450ZINFOtest_unauthorized (external client test context): client received response status = 405
257052025-03-07T23:12:46.450ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257062025-03-07T23:12:46.450ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257072025-03-07T23:12:46.450ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8fc93b22-2324-46eb-97b4-a3f8ef0a3068 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257082025-03-07T23:12:46.450ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8fc93b22-2324-46eb-97b4-a3f8ef0a3068 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257092025-03-07T23:12:46.450ZINFOtest_unauthorized (external client test context): client received response status = 405
257102025-03-07T23:12:46.451ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257112025-03-07T23:12:46.451ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257122025-03-07T23:12:46.451ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257132025-03-07T23:12:46.451ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257142025-03-07T23:12:46.451ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257152025-03-07T23:12:46.451ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257162025-03-07T23:12:46.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257172025-03-07T23:12:46.451ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257182025-03-07T23:12:46.454ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257192025-03-07T23:12:46.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257202025-03-07T23:12:46.455ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257212025-03-07T23:12:46.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
257222025-03-07T23:12:46.460ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
257232025-03-07T23:12:46.460ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257242025-03-07T23:12:46.460ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257252025-03-07T23:12:46.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257262025-03-07T23:12:46.468ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
257272025-03-07T23:12:46.468ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257282025-03-07T23:12:46.468ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257292025-03-07T23:12:46.469ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257302025-03-07T23:12:46.472ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
257312025-03-07T23:12:46.479ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
257322025-03-07T23:12:46.479ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257332025-03-07T23:12:46.479ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257342025-03-07T23:12:46.479ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257352025-03-07T23:12:46.481ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
257362025-03-07T23:12:46.483ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
257372025-03-07T23:12:46.483ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257382025-03-07T23:12:46.483ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257392025-03-07T23:12:46.483ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257402025-03-07T23:12:46.485ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
257412025-03-07T23:12:46.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257422025-03-07T23:12:46.485ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257432025-03-07T23:12:46.486ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257442025-03-07T23:12:46.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
257452025-03-07T23:12:46.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
257462025-03-07T23:12:46.496ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257472025-03-07T23:12:46.496ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257482025-03-07T23:12:46.496ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257492025-03-07T23:12:46.496ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257502025-03-07T23:12:46.499ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257512025-03-07T23:12:46.499ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257522025-03-07T23:12:46.501ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257532025-03-07T23:12:46.503ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257542025-03-07T23:12:46.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257552025-03-07T23:12:46.508ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257562025-03-07T23:12:46.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257572025-03-07T23:12:46.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257582025-03-07T23:12:46.512ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257592025-03-07T23:12:46.514ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257602025-03-07T23:12:46.515ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257612025-03-07T23:12:46.515ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257622025-03-07T23:12:46.519ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257632025-03-07T23:12:46.519ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257642025-03-07T23:12:46.520ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257652025-03-07T23:12:46.520ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257662025-03-07T23:12:46.520ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257672025-03-07T23:12:46.526ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257682025-03-07T23:12:46.526ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257692025-03-07T23:12:46.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257702025-03-07T23:12:46.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257712025-03-07T23:12:46.531ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257722025-03-07T23:12:46.532ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257732025-03-07T23:12:46.532ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257742025-03-07T23:12:46.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257752025-03-07T23:12:46.535ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257762025-03-07T23:12:46.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") }, key: edbd58ab-da5b-4b17-bdb3-a97be99fcf02, lookup_type: ByName("demo-vpc-router") }, key: 1596574f-c9fc-4246-9db2-8eedb4cdacb0, lookup_type: ByName("demo-router-route") } result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257772025-03-07T23:12:46.550ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 101030 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cf50a69f-da5f-4e2d-a075-e001befac575 response_code = 200 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257782025-03-07T23:12:46.551ZINFOtest_unauthorized (external client test context): client received response status = 200
257792025-03-07T23:12:46.551ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257802025-03-07T23:12:46.551ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257812025-03-07T23:12:46.552ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257822025-03-07T23:12:46.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
257832025-03-07T23:12:46.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257842025-03-07T23:12:46.553ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257852025-03-07T23:12:46.553ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
257862025-03-07T23:12:46.553ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257872025-03-07T23:12:46.553ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257882025-03-07T23:12:46.554ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257892025-03-07T23:12:46.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257902025-03-07T23:12:46.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257912025-03-07T23:12:46.560ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257922025-03-07T23:12:46.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
257932025-03-07T23:12:46.564ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
257942025-03-07T23:12:46.564ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257952025-03-07T23:12:46.564ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257962025-03-07T23:12:46.564ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257972025-03-07T23:12:46.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
257982025-03-07T23:12:46.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257992025-03-07T23:12:46.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258002025-03-07T23:12:46.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258012025-03-07T23:12:46.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
258022025-03-07T23:12:46.589ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
258032025-03-07T23:12:46.590ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258042025-03-07T23:12:46.590ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258052025-03-07T23:12:46.590ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258062025-03-07T23:12:46.591ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258072025-03-07T23:12:46.591ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258082025-03-07T23:12:46.596ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
258092025-03-07T23:12:46.597ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
258102025-03-07T23:12:46.598ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258112025-03-07T23:12:46.599ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258122025-03-07T23:12:46.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258132025-03-07T23:12:46.603ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258142025-03-07T23:12:46.604ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258152025-03-07T23:12:46.605ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258162025-03-07T23:12:46.605ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
258172025-03-07T23:12:46.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
258182025-03-07T23:12:46.606ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258192025-03-07T23:12:46.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258202025-03-07T23:12:46.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258212025-03-07T23:12:46.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
258222025-03-07T23:12:46.613ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
258232025-03-07T23:12:46.614ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258242025-03-07T23:12:46.614ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258252025-03-07T23:12:46.614ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258262025-03-07T23:12:46.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258272025-03-07T23:12:46.618ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258282025-03-07T23:12:46.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258292025-03-07T23:12:46.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258302025-03-07T23:12:46.626ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258312025-03-07T23:12:46.626ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258322025-03-07T23:12:46.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258332025-03-07T23:12:46.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258342025-03-07T23:12:46.630ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258352025-03-07T23:12:46.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258362025-03-07T23:12:46.632ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258372025-03-07T23:12:46.632ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258382025-03-07T23:12:46.634ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258392025-03-07T23:12:46.634ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258402025-03-07T23:12:46.634ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258412025-03-07T23:12:46.635ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258422025-03-07T23:12:46.638ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258432025-03-07T23:12:46.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258442025-03-07T23:12:46.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258452025-03-07T23:12:46.639ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258462025-03-07T23:12:46.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258472025-03-07T23:12:46.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258482025-03-07T23:12:46.720ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 168027 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a88543f2-352b-4ac0-93d9-05a3d6a8ea6e response_code = 404 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258492025-03-07T23:12:46.722ZINFOtest_unauthorized (external client test context): client received response status = 404
258502025-03-07T23:12:46.722ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258512025-03-07T23:12:46.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258522025-03-07T23:12:46.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a05faebd-eaa5-457d-9dda-9517748d11f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258532025-03-07T23:12:46.723ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a05faebd-eaa5-457d-9dda-9517748d11f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258542025-03-07T23:12:46.723ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a05faebd-eaa5-457d-9dda-9517748d11f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258552025-03-07T23:12:46.723ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a05faebd-eaa5-457d-9dda-9517748d11f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258562025-03-07T23:12:46.723ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 316 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a05faebd-eaa5-457d-9dda-9517748d11f4 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258572025-03-07T23:12:46.723ZINFOtest_unauthorized (external client test context): client received response status = 401
258582025-03-07T23:12:46.723ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258592025-03-07T23:12:46.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258602025-03-07T23:12:46.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29c8a8ba-e28c-4dbe-95f6-4ce0fe2f2763 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258612025-03-07T23:12:46.727ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29c8a8ba-e28c-4dbe-95f6-4ce0fe2f2763 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258622025-03-07T23:12:46.727ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29c8a8ba-e28c-4dbe-95f6-4ce0fe2f2763 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258632025-03-07T23:12:46.727ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 399 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29c8a8ba-e28c-4dbe-95f6-4ce0fe2f2763 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258642025-03-07T23:12:46.729ZINFOtest_unauthorized (external client test context): client received response status = 401
258652025-03-07T23:12:46.729ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258662025-03-07T23:12:46.729ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258672025-03-07T23:12:46.730ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8ce1d9f1-4e5f-4ed5-acef-a317ef1d6f5f uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258682025-03-07T23:12:46.730ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8ce1d9f1-4e5f-4ed5-acef-a317ef1d6f5f uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258692025-03-07T23:12:46.732ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5628:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5652:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8ce1d9f1-4e5f-4ed5-acef-a317ef1d6f5f uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258702025-03-07T23:12:46.732ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1079 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8ce1d9f1-4e5f-4ed5-acef-a317ef1d6f5f response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258712025-03-07T23:12:46.732ZINFOtest_unauthorized (external client test context): client received response status = 401
258722025-03-07T23:12:46.732ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258732025-03-07T23:12:46.732ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258742025-03-07T23:12:46.732ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4fed88d9-8412-40de-908a-53b8bf2bb0b9 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258752025-03-07T23:12:46.732ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4fed88d9-8412-40de-908a-53b8bf2bb0b9 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258762025-03-07T23:12:46.732ZINFOtest_unauthorized (external client test context): client received response status = 405
258772025-03-07T23:12:46.732ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258782025-03-07T23:12:46.732ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258792025-03-07T23:12:46.732ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a88465be-7d9e-4141-9e8c-be75a4d32bfd uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258802025-03-07T23:12:46.732ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a88465be-7d9e-4141-9e8c-be75a4d32bfd response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258812025-03-07T23:12:46.732ZINFOtest_unauthorized (external client test context): client received response status = 405
258822025-03-07T23:12:46.735ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258832025-03-07T23:12:46.735ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258842025-03-07T23:12:46.736ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0d1913ea-0238-4c9c-aee7-bf10adb884f2 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258852025-03-07T23:12:46.740ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0d1913ea-0238-4c9c-aee7-bf10adb884f2 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258862025-03-07T23:12:46.740ZINFOtest_unauthorized (external client test context): client received response status = 405
258872025-03-07T23:12:46.740ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258882025-03-07T23:12:46.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258892025-03-07T23:12:46.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9afdfeba-ed2a-4daf-94fe-f43901c28550 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258902025-03-07T23:12:46.741ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9afdfeba-ed2a-4daf-94fe-f43901c28550 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258912025-03-07T23:12:46.741ZINFOtest_unauthorized (external client test context): client received response status = 405
258922025-03-07T23:12:46.741ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258932025-03-07T23:12:46.741ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
258942025-03-07T23:12:46.741ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258952025-03-07T23:12:46.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258962025-03-07T23:12:46.741ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
258972025-03-07T23:12:46.741ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258982025-03-07T23:12:46.741ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258992025-03-07T23:12:46.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259002025-03-07T23:12:46.745ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259012025-03-07T23:12:46.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259022025-03-07T23:12:46.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259032025-03-07T23:12:46.749ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
259042025-03-07T23:12:46.749ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
259052025-03-07T23:12:46.749ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259062025-03-07T23:12:46.749ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259072025-03-07T23:12:46.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259082025-03-07T23:12:46.753ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
259092025-03-07T23:12:46.755ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259102025-03-07T23:12:46.755ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259112025-03-07T23:12:46.755ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259122025-03-07T23:12:46.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
259132025-03-07T23:12:46.763ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
259142025-03-07T23:12:46.763ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259152025-03-07T23:12:46.763ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259162025-03-07T23:12:46.763ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259172025-03-07T23:12:46.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
259182025-03-07T23:12:46.768ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
259192025-03-07T23:12:46.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259202025-03-07T23:12:46.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259212025-03-07T23:12:46.770ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259222025-03-07T23:12:46.785ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
259232025-03-07T23:12:46.786ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259242025-03-07T23:12:46.786ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259252025-03-07T23:12:46.787ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259262025-03-07T23:12:46.798ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
259272025-03-07T23:12:46.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
259282025-03-07T23:12:46.803ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259292025-03-07T23:12:46.803ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259302025-03-07T23:12:46.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259312025-03-07T23:12:46.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259322025-03-07T23:12:46.810ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259332025-03-07T23:12:46.810ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259342025-03-07T23:12:46.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259352025-03-07T23:12:46.822ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259362025-03-07T23:12:46.822ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259372025-03-07T23:12:46.823ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259382025-03-07T23:12:46.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259392025-03-07T23:12:46.827ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259402025-03-07T23:12:46.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259412025-03-07T23:12:46.827ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259422025-03-07T23:12:46.827ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259432025-03-07T23:12:46.831ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259442025-03-07T23:12:46.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259452025-03-07T23:12:46.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259462025-03-07T23:12:46.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259472025-03-07T23:12:46.835ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259482025-03-07T23:12:46.838ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259492025-03-07T23:12:46.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259502025-03-07T23:12:46.838ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259512025-03-07T23:12:46.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259522025-03-07T23:12:46.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: fc680bc2-be0e-46b0-b793-b590e88c148c, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259532025-03-07T23:12:46.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 120595 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f7946df-ee93-4bc5-b43e-da8942c4d1e9 response_code = 404 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259542025-03-07T23:12:46.857ZINFOtest_unauthorized (external client test context): client received response status = 404
259552025-03-07T23:12:46.857ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259562025-03-07T23:12:46.858ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259572025-03-07T23:12:46.858ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dd4da89b-3857-4b1c-a42d-40ab1de99934 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259582025-03-07T23:12:46.858ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dd4da89b-3857-4b1c-a42d-40ab1de99934 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259592025-03-07T23:12:46.859ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dd4da89b-3857-4b1c-a42d-40ab1de99934 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259602025-03-07T23:12:46.859ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dd4da89b-3857-4b1c-a42d-40ab1de99934 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259612025-03-07T23:12:46.859ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 501 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = dd4da89b-3857-4b1c-a42d-40ab1de99934 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259622025-03-07T23:12:46.859ZINFOtest_unauthorized (external client test context): client received response status = 401
259632025-03-07T23:12:46.859ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259642025-03-07T23:12:46.859ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259652025-03-07T23:12:46.860ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 08b6198a-06b8-4f06-93fb-994eda862213 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259662025-03-07T23:12:46.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 08b6198a-06b8-4f06-93fb-994eda862213 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259672025-03-07T23:12:46.860ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 08b6198a-06b8-4f06-93fb-994eda862213 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259682025-03-07T23:12:46.860ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 265 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 08b6198a-06b8-4f06-93fb-994eda862213 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259692025-03-07T23:12:46.860ZINFOtest_unauthorized (external client test context): client received response status = 401
259702025-03-07T23:12:46.860ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259712025-03-07T23:12:46.860ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259722025-03-07T23:12:46.860ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 27044dcd-92db-4467-acd4-819225f3e4f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259732025-03-07T23:12:46.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 27044dcd-92db-4467-acd4-819225f3e4f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259742025-03-07T23:12:46.861ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5697:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5709:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 27044dcd-92db-4467-acd4-819225f3e4f4 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259752025-03-07T23:12:46.861ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 933 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 27044dcd-92db-4467-acd4-819225f3e4f4 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259762025-03-07T23:12:46.862ZINFOtest_unauthorized (external client test context): client received response status = 401
259772025-03-07T23:12:46.862ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259782025-03-07T23:12:46.862ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259792025-03-07T23:12:46.862ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d1c2e837-50b0-48f7-88db-c2f74a8c7ecf uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259802025-03-07T23:12:46.862ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d1c2e837-50b0-48f7-88db-c2f74a8c7ecf response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259812025-03-07T23:12:46.862ZINFOtest_unauthorized (external client test context): client received response status = 405
259822025-03-07T23:12:46.862ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259832025-03-07T23:12:46.862ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259842025-03-07T23:12:46.862ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 496b8d0e-6449-4cd8-b195-79f01b6f3f79 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259852025-03-07T23:12:46.862ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 496b8d0e-6449-4cd8-b195-79f01b6f3f79 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259862025-03-07T23:12:46.862ZINFOtest_unauthorized (external client test context): client received response status = 405
259872025-03-07T23:12:46.862ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259882025-03-07T23:12:46.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259892025-03-07T23:12:46.863ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a42e50ec-b8a1-4ce2-a316-336c5aa63927 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259902025-03-07T23:12:46.863ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a42e50ec-b8a1-4ce2-a316-336c5aa63927 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259912025-03-07T23:12:46.863ZINFOtest_unauthorized (external client test context): client received response status = 405
259922025-03-07T23:12:46.864ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259932025-03-07T23:12:46.864ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259942025-03-07T23:12:46.864ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a876ec0-4346-450b-8518-a71582594b6d uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259952025-03-07T23:12:46.864ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a876ec0-4346-450b-8518-a71582594b6d response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259962025-03-07T23:12:46.864ZINFOtest_unauthorized (external client test context): client received response status = 405
259972025-03-07T23:12:46.864ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
259982025-03-07T23:12:46.864ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
259992025-03-07T23:12:46.864ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 499d82d6-7582-48bf-8ead-826a997e7a29 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260002025-03-07T23:12:46.864ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 499d82d6-7582-48bf-8ead-826a997e7a29 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260012025-03-07T23:12:46.864ZINFOtest_unauthorized (external client test context): client received response status = 405
260022025-03-07T23:12:46.864ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260032025-03-07T23:12:46.864ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
260042025-03-07T23:12:46.864ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f083b46a-bffd-4618-ba22-a6a0425b0ab5 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260052025-03-07T23:12:46.866ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f083b46a-bffd-4618-ba22-a6a0425b0ab5 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260062025-03-07T23:12:46.866ZINFOtest_unauthorized (external client test context): client received response status = 405
260072025-03-07T23:12:46.866ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260082025-03-07T23:12:46.866ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
260092025-03-07T23:12:46.866ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 070a79e9-e126-4982-b15f-2e3fc40bf62c uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260102025-03-07T23:12:46.867ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 070a79e9-e126-4982-b15f-2e3fc40bf62c response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260112025-03-07T23:12:46.867ZINFOtest_unauthorized (external client test context): client received response status = 405
260122025-03-07T23:12:46.867ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260132025-03-07T23:12:46.867ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways?project=demo-project&vpc=demo-vpc
260142025-03-07T23:12:46.867ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8426717d-019e-4934-a7d6-15695461ec09 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260152025-03-07T23:12:46.867ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8426717d-019e-4934-a7d6-15695461ec09 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260162025-03-07T23:12:46.868ZINFOtest_unauthorized (external client test context): client received response status = 405
260172025-03-07T23:12:46.868ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
260182025-03-07T23:12:46.868ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260192025-03-07T23:12:46.868ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260202025-03-07T23:12:46.868ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260212025-03-07T23:12:46.869ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260222025-03-07T23:12:46.869ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260232025-03-07T23:12:46.869ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260242025-03-07T23:12:46.869ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260252025-03-07T23:12:46.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260262025-03-07T23:12:46.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260272025-03-07T23:12:46.869ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260282025-03-07T23:12:46.871ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260292025-03-07T23:12:46.871ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260302025-03-07T23:12:46.871ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260312025-03-07T23:12:46.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
260322025-03-07T23:12:46.872ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
260332025-03-07T23:12:46.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260342025-03-07T23:12:46.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260352025-03-07T23:12:46.873ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260362025-03-07T23:12:46.874ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
260372025-03-07T23:12:46.875ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260382025-03-07T23:12:46.875ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260392025-03-07T23:12:46.875ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260402025-03-07T23:12:46.880ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
260412025-03-07T23:12:46.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
260422025-03-07T23:12:46.883ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260432025-03-07T23:12:46.883ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260442025-03-07T23:12:46.884ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260452025-03-07T23:12:46.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
260462025-03-07T23:12:46.887ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
260472025-03-07T23:12:46.887ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260482025-03-07T23:12:46.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260492025-03-07T23:12:46.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260502025-03-07T23:12:46.889ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
260512025-03-07T23:12:46.889ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260522025-03-07T23:12:46.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260532025-03-07T23:12:46.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260542025-03-07T23:12:46.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
260552025-03-07T23:12:46.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
260562025-03-07T23:12:46.898ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260572025-03-07T23:12:46.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260582025-03-07T23:12:46.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260592025-03-07T23:12:46.898ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260602025-03-07T23:12:46.899ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260612025-03-07T23:12:46.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260622025-03-07T23:12:46.900ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260632025-03-07T23:12:46.902ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260642025-03-07T23:12:46.902ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260652025-03-07T23:12:46.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260662025-03-07T23:12:46.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260672025-03-07T23:12:46.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260682025-03-07T23:12:46.907ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260692025-03-07T23:12:46.909ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 43398 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7376548a-19ac-4050-9ad1-8542de15c1be response_code = 404 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260702025-03-07T23:12:46.910ZINFOtest_unauthorized (external client test context): client received response status = 404
260712025-03-07T23:12:46.911ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260722025-03-07T23:12:46.911ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260732025-03-07T23:12:46.911ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f4bd1d3-f438-492f-964c-aa15253090e0 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260742025-03-07T23:12:46.911ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f4bd1d3-f438-492f-964c-aa15253090e0 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260752025-03-07T23:12:46.911ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f4bd1d3-f438-492f-964c-aa15253090e0 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260762025-03-07T23:12:46.911ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f4bd1d3-f438-492f-964c-aa15253090e0 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260772025-03-07T23:12:46.911ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 338 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f4bd1d3-f438-492f-964c-aa15253090e0 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260782025-03-07T23:12:46.912ZINFOtest_unauthorized (external client test context): client received response status = 401
260792025-03-07T23:12:46.912ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260802025-03-07T23:12:46.912ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260812025-03-07T23:12:46.912ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17120e8a-2e87-4854-a63b-4da09542a65e uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260822025-03-07T23:12:46.912ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17120e8a-2e87-4854-a63b-4da09542a65e uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260832025-03-07T23:12:46.912ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17120e8a-2e87-4854-a63b-4da09542a65e uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260842025-03-07T23:12:46.912ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 180 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 17120e8a-2e87-4854-a63b-4da09542a65e response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260852025-03-07T23:12:46.917ZINFOtest_unauthorized (external client test context): client received response status = 401
260862025-03-07T23:12:46.918ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260872025-03-07T23:12:46.918ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260882025-03-07T23:12:46.918ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 729e33ee-c0e4-496a-920d-a0e431d2d947 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260892025-03-07T23:12:46.918ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 729e33ee-c0e4-496a-920d-a0e431d2d947 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260902025-03-07T23:12:46.918ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5667:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5683:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 729e33ee-c0e4-496a-920d-a0e431d2d947 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260912025-03-07T23:12:46.921ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1428 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 729e33ee-c0e4-496a-920d-a0e431d2d947 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260922025-03-07T23:12:46.921ZINFOtest_unauthorized (external client test context): client received response status = 401
260932025-03-07T23:12:46.923ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260942025-03-07T23:12:46.928ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260952025-03-07T23:12:46.928ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a49cb80-4731-4898-9115-a0787dd25b7c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260962025-03-07T23:12:46.928ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5a49cb80-4731-4898-9115-a0787dd25b7c response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260972025-03-07T23:12:46.929ZINFOtest_unauthorized (external client test context): client received response status = 405
260982025-03-07T23:12:46.929ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
260992025-03-07T23:12:46.929ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261002025-03-07T23:12:46.929ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 19f67111-0a09-4774-bdbe-1a44cb595a2c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261012025-03-07T23:12:46.929ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 19f67111-0a09-4774-bdbe-1a44cb595a2c response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261022025-03-07T23:12:46.929ZINFOtest_unauthorized (external client test context): client received response status = 405
261032025-03-07T23:12:46.929ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261042025-03-07T23:12:46.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261052025-03-07T23:12:46.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ff52b12d-0e84-42bd-b702-b9878647b93f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261062025-03-07T23:12:46.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ff52b12d-0e84-42bd-b702-b9878647b93f response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261072025-03-07T23:12:46.930ZINFOtest_unauthorized (external client test context): client received response status = 405
261082025-03-07T23:12:46.930ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261092025-03-07T23:12:46.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261102025-03-07T23:12:46.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8097419c-81fb-4393-95b8-eb9c180380b9 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261112025-03-07T23:12:46.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8097419c-81fb-4393-95b8-eb9c180380b9 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261122025-03-07T23:12:46.930ZINFOtest_unauthorized (external client test context): client received response status = 405
261132025-03-07T23:12:46.930ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261142025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261152025-03-07T23:12:46.934ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 52ad420c-bfbd-4227-bcdf-099ecddd18de uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261162025-03-07T23:12:46.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 52ad420c-bfbd-4227-bcdf-099ecddd18de response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261172025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client received response status = 405
261182025-03-07T23:12:46.934ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261192025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261202025-03-07T23:12:46.934ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3ecc2e6-ee36-4e99-8384-25f18592e47f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261212025-03-07T23:12:46.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3ecc2e6-ee36-4e99-8384-25f18592e47f response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261222025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client received response status = 405
261232025-03-07T23:12:46.934ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261242025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261252025-03-07T23:12:46.934ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e8865946-44eb-445b-a99e-b70e03e80092 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261262025-03-07T23:12:46.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e8865946-44eb-445b-a99e-b70e03e80092 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261272025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client received response status = 405
261282025-03-07T23:12:46.934ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261292025-03-07T23:12:46.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261302025-03-07T23:12:46.934ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ac72f20b-cd55-4b60-b2ab-b660c2dc62cb uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261312025-03-07T23:12:46.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ac72f20b-cd55-4b60-b2ab-b660c2dc62cb response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261322025-03-07T23:12:46.935ZINFOtest_unauthorized (external client test context): client received response status = 405
261332025-03-07T23:12:46.935ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261342025-03-07T23:12:46.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261352025-03-07T23:12:46.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261362025-03-07T23:12:46.935ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261372025-03-07T23:12:46.935ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261382025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261392025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261402025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261412025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261422025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261432025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261442025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
261452025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
261462025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261472025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261482025-03-07T23:12:46.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261492025-03-07T23:12:46.935ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
261502025-03-07T23:12:46.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261512025-03-07T23:12:46.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261522025-03-07T23:12:46.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261532025-03-07T23:12:46.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
261542025-03-07T23:12:46.949ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
261552025-03-07T23:12:46.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261562025-03-07T23:12:46.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261572025-03-07T23:12:46.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261582025-03-07T23:12:46.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
261592025-03-07T23:12:46.953ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
261602025-03-07T23:12:46.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261612025-03-07T23:12:46.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261622025-03-07T23:12:46.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261632025-03-07T23:12:46.958ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
261642025-03-07T23:12:46.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261652025-03-07T23:12:46.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261662025-03-07T23:12:46.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261672025-03-07T23:12:46.961ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
261682025-03-07T23:12:46.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
261692025-03-07T23:12:46.978ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261702025-03-07T23:12:46.978ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261712025-03-07T23:12:46.978ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261722025-03-07T23:12:46.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261732025-03-07T23:12:46.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261742025-03-07T23:12:46.987ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261752025-03-07T23:12:46.989ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261762025-03-07T23:12:46.991ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261772025-03-07T23:12:46.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261782025-03-07T23:12:46.993ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261792025-03-07T23:12:46.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261802025-03-07T23:12:46.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261812025-03-07T23:12:46.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261822025-03-07T23:12:46.999ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 81017 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a7252ac3-034d-4141-8be0-976a638a1d77 response_code = 404 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261832025-03-07T23:12:47.000ZINFOtest_unauthorized (external client test context): client received response status = 404
261842025-03-07T23:12:47.001ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261852025-03-07T23:12:47.001ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261862025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9904863a-b47f-409c-811b-c49850c29c0c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261872025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9904863a-b47f-409c-811b-c49850c29c0c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261882025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9904863a-b47f-409c-811b-c49850c29c0c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261892025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9904863a-b47f-409c-811b-c49850c29c0c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261902025-03-07T23:12:47.003ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1463 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9904863a-b47f-409c-811b-c49850c29c0c response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261912025-03-07T23:12:47.003ZINFOtest_unauthorized (external client test context): client received response status = 401
261922025-03-07T23:12:47.003ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261932025-03-07T23:12:47.003ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261942025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d63792e7-e13e-448b-b5ee-01099b6fcfe1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261952025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d63792e7-e13e-448b-b5ee-01099b6fcfe1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261962025-03-07T23:12:47.003ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d63792e7-e13e-448b-b5ee-01099b6fcfe1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261972025-03-07T23:12:47.004ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 197 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d63792e7-e13e-448b-b5ee-01099b6fcfe1 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
261982025-03-07T23:12:47.004ZINFOtest_unauthorized (external client test context): client received response status = 401
261992025-03-07T23:12:47.004ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262002025-03-07T23:12:47.004ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262012025-03-07T23:12:47.005ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bdff349b-43e4-4623-b196-7f37a8b149a6 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262022025-03-07T23:12:47.005ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bdff349b-43e4-4623-b196-7f37a8b149a6 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262032025-03-07T23:12:47.006ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5724:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5740:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bdff349b-43e4-4623-b196-7f37a8b149a6 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262042025-03-07T23:12:47.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1153 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bdff349b-43e4-4623-b196-7f37a8b149a6 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262052025-03-07T23:12:47.006ZINFOtest_unauthorized (external client test context): client received response status = 401
262062025-03-07T23:12:47.006ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262072025-03-07T23:12:47.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262082025-03-07T23:12:47.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 17506cea-054a-44c4-af4f-d7477cda65ba uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262092025-03-07T23:12:47.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 17506cea-054a-44c4-af4f-d7477cda65ba response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262102025-03-07T23:12:47.006ZINFOtest_unauthorized (external client test context): client received response status = 405
262112025-03-07T23:12:47.006ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262122025-03-07T23:12:47.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262132025-03-07T23:12:47.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7b355672-5b84-4da3-a352-a29bcd89409c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262142025-03-07T23:12:47.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7b355672-5b84-4da3-a352-a29bcd89409c response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262152025-03-07T23:12:47.007ZINFOtest_unauthorized (external client test context): client received response status = 405
262162025-03-07T23:12:47.007ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262172025-03-07T23:12:47.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262182025-03-07T23:12:47.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e183ddd9-d63a-4ebc-9459-fa2a6bd6a3f5 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262192025-03-07T23:12:47.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e183ddd9-d63a-4ebc-9459-fa2a6bd6a3f5 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262202025-03-07T23:12:47.007ZINFOtest_unauthorized (external client test context): client received response status = 405
262212025-03-07T23:12:47.007ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262222025-03-07T23:12:47.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262232025-03-07T23:12:47.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a72c49ea-c727-45ac-ad48-939295db637d uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262242025-03-07T23:12:47.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a72c49ea-c727-45ac-ad48-939295db637d response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262252025-03-07T23:12:47.008ZINFOtest_unauthorized (external client test context): client received response status = 405
262262025-03-07T23:12:47.009ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
262272025-03-07T23:12:47.009ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262282025-03-07T23:12:47.009ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262292025-03-07T23:12:47.009ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262302025-03-07T23:12:47.009ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262312025-03-07T23:12:47.009ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262322025-03-07T23:12:47.010ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262332025-03-07T23:12:47.010ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262342025-03-07T23:12:47.010ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262352025-03-07T23:12:47.010ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262362025-03-07T23:12:47.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262372025-03-07T23:12:47.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262382025-03-07T23:12:47.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262392025-03-07T23:12:47.013ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262402025-03-07T23:12:47.015ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
262412025-03-07T23:12:47.015ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
262422025-03-07T23:12:47.015ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262432025-03-07T23:12:47.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262442025-03-07T23:12:47.015ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262452025-03-07T23:12:47.017ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
262462025-03-07T23:12:47.017ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262472025-03-07T23:12:47.017ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262482025-03-07T23:12:47.018ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262492025-03-07T23:12:47.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
262502025-03-07T23:12:47.026ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
262512025-03-07T23:12:47.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262522025-03-07T23:12:47.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262532025-03-07T23:12:47.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262542025-03-07T23:12:47.031ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
262552025-03-07T23:12:47.031ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
262562025-03-07T23:12:47.031ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262572025-03-07T23:12:47.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262582025-03-07T23:12:47.031ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262592025-03-07T23:12:47.031ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
262602025-03-07T23:12:47.031ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262612025-03-07T23:12:47.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262622025-03-07T23:12:47.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262632025-03-07T23:12:47.034ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
262642025-03-07T23:12:47.037ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
262652025-03-07T23:12:47.037ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262662025-03-07T23:12:47.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262672025-03-07T23:12:47.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262682025-03-07T23:12:47.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262692025-03-07T23:12:47.039ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262702025-03-07T23:12:47.039ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262712025-03-07T23:12:47.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262722025-03-07T23:12:47.042ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262732025-03-07T23:12:47.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262742025-03-07T23:12:47.043ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262752025-03-07T23:12:47.045ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262762025-03-07T23:12:47.045ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262772025-03-07T23:12:47.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262782025-03-07T23:12:47.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 40394 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d9739e5c-7108-44b4-abf7-e8c0c0beaf44 response_code = 404 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262792025-03-07T23:12:47.049ZINFOtest_unauthorized (external client test context): client received response status = 404
262802025-03-07T23:12:47.049ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262812025-03-07T23:12:47.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262822025-03-07T23:12:47.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae9342b3-c1f8-45ce-a746-a970c6beac23 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262832025-03-07T23:12:47.050ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae9342b3-c1f8-45ce-a746-a970c6beac23 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262842025-03-07T23:12:47.051ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae9342b3-c1f8-45ce-a746-a970c6beac23 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262852025-03-07T23:12:47.051ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae9342b3-c1f8-45ce-a746-a970c6beac23 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262862025-03-07T23:12:47.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 372 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ae9342b3-c1f8-45ce-a746-a970c6beac23 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262872025-03-07T23:12:47.051ZINFOtest_unauthorized (external client test context): client received response status = 401
262882025-03-07T23:12:47.052ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262892025-03-07T23:12:47.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262902025-03-07T23:12:47.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a38f425-5f19-47bf-b72c-37ce9bbdffa2 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262912025-03-07T23:12:47.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a38f425-5f19-47bf-b72c-37ce9bbdffa2 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262922025-03-07T23:12:47.052ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a38f425-5f19-47bf-b72c-37ce9bbdffa2 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262932025-03-07T23:12:47.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 188 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3a38f425-5f19-47bf-b72c-37ce9bbdffa2 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262942025-03-07T23:12:47.052ZINFOtest_unauthorized (external client test context): client received response status = 401
262952025-03-07T23:12:47.052ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262962025-03-07T23:12:47.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262972025-03-07T23:12:47.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7eeefd69-a1fb-4fd7-b9d3-aea9d5b09ed6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262982025-03-07T23:12:47.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7eeefd69-a1fb-4fd7-b9d3-aea9d5b09ed6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
262992025-03-07T23:12:47.058ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5756:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5782:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7eeefd69-a1fb-4fd7-b9d3-aea9d5b09ed6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263002025-03-07T23:12:47.058ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 897 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7eeefd69-a1fb-4fd7-b9d3-aea9d5b09ed6 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263012025-03-07T23:12:47.058ZINFOtest_unauthorized (external client test context): client received response status = 401
263022025-03-07T23:12:47.058ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263032025-03-07T23:12:47.058ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263042025-03-07T23:12:47.058ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6d72dd5b-51a4-4507-8042-597c745dbbe2 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263052025-03-07T23:12:47.058ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 6d72dd5b-51a4-4507-8042-597c745dbbe2 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263062025-03-07T23:12:47.058ZINFOtest_unauthorized (external client test context): client received response status = 405
263072025-03-07T23:12:47.058ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263082025-03-07T23:12:47.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263092025-03-07T23:12:47.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 27eaa0e7-0d5b-4e41-bdca-c3c7a1a38053 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263102025-03-07T23:12:47.060ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 27eaa0e7-0d5b-4e41-bdca-c3c7a1a38053 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263112025-03-07T23:12:47.060ZINFOtest_unauthorized (external client test context): client received response status = 405
263122025-03-07T23:12:47.063ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263132025-03-07T23:12:47.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263142025-03-07T23:12:47.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9517ad63-932d-4622-a01a-1f3b3a4bff8e uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263152025-03-07T23:12:47.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9517ad63-932d-4622-a01a-1f3b3a4bff8e response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263162025-03-07T23:12:47.064ZINFOtest_unauthorized (external client test context): client received response status = 405
263172025-03-07T23:12:47.064ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263182025-03-07T23:12:47.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263192025-03-07T23:12:47.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93632d64-8660-4cda-b91f-bb5e39e67c49 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263202025-03-07T23:12:47.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 93632d64-8660-4cda-b91f-bb5e39e67c49 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263212025-03-07T23:12:47.065ZINFOtest_unauthorized (external client test context): client received response status = 405
263222025-03-07T23:12:47.065ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263232025-03-07T23:12:47.065ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263242025-03-07T23:12:47.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263252025-03-07T23:12:47.066ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263262025-03-07T23:12:47.066ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263272025-03-07T23:12:47.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263282025-03-07T23:12:47.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263292025-03-07T23:12:47.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263302025-03-07T23:12:47.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263312025-03-07T23:12:47.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263322025-03-07T23:12:47.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263332025-03-07T23:12:47.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
263342025-03-07T23:12:47.068ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
263352025-03-07T23:12:47.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263362025-03-07T23:12:47.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263372025-03-07T23:12:47.073ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263382025-03-07T23:12:47.073ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
263392025-03-07T23:12:47.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263402025-03-07T23:12:47.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263412025-03-07T23:12:47.073ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263422025-03-07T23:12:47.080ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
263432025-03-07T23:12:47.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
263442025-03-07T23:12:47.088ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263452025-03-07T23:12:47.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263462025-03-07T23:12:47.090ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263472025-03-07T23:12:47.092ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
263482025-03-07T23:12:47.092ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
263492025-03-07T23:12:47.092ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263502025-03-07T23:12:47.092ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263512025-03-07T23:12:47.092ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263522025-03-07T23:12:47.094ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
263532025-03-07T23:12:47.095ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263542025-03-07T23:12:47.095ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263552025-03-07T23:12:47.095ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263562025-03-07T23:12:47.096ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
263572025-03-07T23:12:47.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
263582025-03-07T23:12:47.101ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263592025-03-07T23:12:47.101ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263602025-03-07T23:12:47.101ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263612025-03-07T23:12:47.102ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263622025-03-07T23:12:47.107ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263632025-03-07T23:12:47.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263642025-03-07T23:12:47.107ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263652025-03-07T23:12:47.110ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263662025-03-07T23:12:47.110ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263672025-03-07T23:12:47.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263682025-03-07T23:12:47.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263692025-03-07T23:12:47.113ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263702025-03-07T23:12:47.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263712025-03-07T23:12:47.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 60209 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1acbe2c4-67b8-498b-9d85-bbfa6c4f0257 response_code = 404 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263722025-03-07T23:12:47.117ZINFOtest_unauthorized (external client test context): client received response status = 404
263732025-03-07T23:12:47.117ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263742025-03-07T23:12:47.117ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263752025-03-07T23:12:47.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49f4310a-2e05-4f77-86b3-de0cc43f03cb uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263762025-03-07T23:12:47.125ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49f4310a-2e05-4f77-86b3-de0cc43f03cb uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263772025-03-07T23:12:47.126ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49f4310a-2e05-4f77-86b3-de0cc43f03cb uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263782025-03-07T23:12:47.126ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49f4310a-2e05-4f77-86b3-de0cc43f03cb uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263792025-03-07T23:12:47.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 580 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 49f4310a-2e05-4f77-86b3-de0cc43f03cb response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263802025-03-07T23:12:47.126ZINFOtest_unauthorized (external client test context): client received response status = 401
263812025-03-07T23:12:47.126ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263822025-03-07T23:12:47.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263832025-03-07T23:12:47.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e3259858-bb08-4f95-a318-8ac182d5aa8e uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263842025-03-07T23:12:47.126ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e3259858-bb08-4f95-a318-8ac182d5aa8e uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263852025-03-07T23:12:47.126ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e3259858-bb08-4f95-a318-8ac182d5aa8e uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263862025-03-07T23:12:47.127ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 228 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e3259858-bb08-4f95-a318-8ac182d5aa8e response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263872025-03-07T23:12:47.127ZINFOtest_unauthorized (external client test context): client received response status = 401
263882025-03-07T23:12:47.127ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263892025-03-07T23:12:47.127ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263902025-03-07T23:12:47.127ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5d353b08-a67a-4954-9b2f-681628758442 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263912025-03-07T23:12:47.127ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5d353b08-a67a-4954-9b2f-681628758442 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263922025-03-07T23:12:47.127ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5795:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5809:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5d353b08-a67a-4954-9b2f-681628758442 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263932025-03-07T23:12:47.127ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 959 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5d353b08-a67a-4954-9b2f-681628758442 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263942025-03-07T23:12:47.127ZINFOtest_unauthorized (external client test context): client received response status = 401
263952025-03-07T23:12:47.128ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263962025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263972025-03-07T23:12:47.128ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 238da36f-0526-4861-933c-5ffdcbfe6cb5 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263982025-03-07T23:12:47.128ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 238da36f-0526-4861-933c-5ffdcbfe6cb5 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
263992025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client received response status = 405
264002025-03-07T23:12:47.128ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264012025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264022025-03-07T23:12:47.128ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 881f258a-b6ce-4d81-9464-d15edf6100af uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264032025-03-07T23:12:47.128ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 881f258a-b6ce-4d81-9464-d15edf6100af response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264042025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client received response status = 405
264052025-03-07T23:12:47.128ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264062025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264072025-03-07T23:12:47.128ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cf145df2-1510-4a91-839f-3c6ffc1f6198 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264082025-03-07T23:12:47.128ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cf145df2-1510-4a91-839f-3c6ffc1f6198 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264092025-03-07T23:12:47.128ZINFOtest_unauthorized (external client test context): client received response status = 405
264102025-03-07T23:12:47.128ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264112025-03-07T23:12:47.129ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264122025-03-07T23:12:47.129ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c4d7797-b42e-4f50-b518-16171b8cb227 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264132025-03-07T23:12:47.129ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c4d7797-b42e-4f50-b518-16171b8cb227 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264142025-03-07T23:12:47.129ZINFOtest_unauthorized (external client test context): client received response status = 405
264152025-03-07T23:12:47.129ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264162025-03-07T23:12:47.129ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264172025-03-07T23:12:47.129ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a0c3550-5ed6-4287-b72e-979721a28d54 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264182025-03-07T23:12:47.129ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a0c3550-5ed6-4287-b72e-979721a28d54 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264192025-03-07T23:12:47.129ZINFOtest_unauthorized (external client test context): client received response status = 405
264202025-03-07T23:12:47.129ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264212025-03-07T23:12:47.129ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264222025-03-07T23:12:47.129ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 36638375-478c-4304-8638-2b48de43e4d9 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264232025-03-07T23:12:47.130ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 36638375-478c-4304-8638-2b48de43e4d9 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264242025-03-07T23:12:47.130ZINFOtest_unauthorized (external client test context): client received response status = 405
264252025-03-07T23:12:47.130ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264262025-03-07T23:12:47.130ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264272025-03-07T23:12:47.130ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a43a6196-7c3e-41c4-9db7-beca05aa0068 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264282025-03-07T23:12:47.130ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a43a6196-7c3e-41c4-9db7-beca05aa0068 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264292025-03-07T23:12:47.131ZINFOtest_unauthorized (external client test context): client received response status = 405
264302025-03-07T23:12:47.131ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264312025-03-07T23:12:47.131ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264322025-03-07T23:12:47.131ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dff7bc33-b096-4713-9012-726579e3d691 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264332025-03-07T23:12:47.131ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dff7bc33-b096-4713-9012-726579e3d691 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264342025-03-07T23:12:47.131ZINFOtest_unauthorized (external client test context): client received response status = 405
264352025-03-07T23:12:47.131ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264362025-03-07T23:12:47.131ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264372025-03-07T23:12:47.131ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264382025-03-07T23:12:47.131ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264392025-03-07T23:12:47.131ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264402025-03-07T23:12:47.131ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a610c41b-0975-4cc7-8507-876be7f0d4af uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264412025-03-07T23:12:47.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a610c41b-0975-4cc7-8507-876be7f0d4af response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264422025-03-07T23:12:47.134ZINFOtest_unauthorized (external client test context): client received response status = 405
264432025-03-07T23:12:47.134ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264442025-03-07T23:12:47.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264452025-03-07T23:12:47.137ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8df53f2b-f4a1-439b-ab0e-a87a534e8fdc uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264462025-03-07T23:12:47.137ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8df53f2b-f4a1-439b-ab0e-a87a534e8fdc response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264472025-03-07T23:12:47.138ZINFOtest_unauthorized (external client test context): client received response status = 405
264482025-03-07T23:12:47.138ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264492025-03-07T23:12:47.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264502025-03-07T23:12:47.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 83c639fe-8982-4d41-aa6c-6df0800afd99 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264512025-03-07T23:12:47.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 83c639fe-8982-4d41-aa6c-6df0800afd99 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264522025-03-07T23:12:47.142ZINFOtest_unauthorized (external client test context): client received response status = 405
264532025-03-07T23:12:47.143ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264542025-03-07T23:12:47.143ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264552025-03-07T23:12:47.143ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fee154d4-415d-4df1-ab11-f903bbf2cdf5 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264562025-03-07T23:12:47.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fee154d4-415d-4df1-ab11-f903bbf2cdf5 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264572025-03-07T23:12:47.143ZINFOtest_unauthorized (external client test context): client received response status = 405
264582025-03-07T23:12:47.143ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264592025-03-07T23:12:47.143ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264602025-03-07T23:12:47.143ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec17fbd0-1b0e-4350-8e97-0f76cc240ce4 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264612025-03-07T23:12:47.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ec17fbd0-1b0e-4350-8e97-0f76cc240ce4 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264622025-03-07T23:12:47.143ZINFOtest_unauthorized (external client test context): client received response status = 405
264632025-03-07T23:12:47.144ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264642025-03-07T23:12:47.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264652025-03-07T23:12:47.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4b13d7dc-ad98-41a5-8263-eeb7e8b39c9b uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264662025-03-07T23:12:47.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4b13d7dc-ad98-41a5-8263-eeb7e8b39c9b response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264672025-03-07T23:12:47.145ZINFOtest_unauthorized (external client test context): client received response status = 405
264682025-03-07T23:12:47.145ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264692025-03-07T23:12:47.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264702025-03-07T23:12:47.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e6b287fe-2b77-4883-aa12-d0ac5c7cbcdc uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264712025-03-07T23:12:47.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e6b287fe-2b77-4883-aa12-d0ac5c7cbcdc response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264722025-03-07T23:12:47.145ZINFOtest_unauthorized (external client test context): client received response status = 405
264732025-03-07T23:12:47.145ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264742025-03-07T23:12:47.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264752025-03-07T23:12:47.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f2e62360-b5f7-4d67-adbe-8f3973931bc2 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264762025-03-07T23:12:47.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f2e62360-b5f7-4d67-adbe-8f3973931bc2 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264772025-03-07T23:12:47.150ZINFOtest_unauthorized (external client test context): client received response status = 405
264782025-03-07T23:12:47.150ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264792025-03-07T23:12:47.150ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264802025-03-07T23:12:47.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06af41ab-2bc2-4066-be53-f6f50b9ee044 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264812025-03-07T23:12:47.152ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 212 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 06af41ab-2bc2-4066-be53-f6f50b9ee044 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264822025-03-07T23:12:47.153ZINFOtest_unauthorized (external client test context): client received response status = 405
264832025-03-07T23:12:47.154ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264842025-03-07T23:12:47.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264852025-03-07T23:12:47.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 21675f8c-3aed-482c-bf57-b9fffc8cfd05 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264862025-03-07T23:12:47.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 21675f8c-3aed-482c-bf57-b9fffc8cfd05 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264872025-03-07T23:12:47.154ZINFOtest_unauthorized (external client test context): client received response status = 405
264882025-03-07T23:12:47.154ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264892025-03-07T23:12:47.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264902025-03-07T23:12:47.157ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ff9eaa8b-05ef-4c6d-854e-108fbd3fbf87 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264912025-03-07T23:12:47.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ff9eaa8b-05ef-4c6d-854e-108fbd3fbf87 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264922025-03-07T23:12:47.158ZINFOtest_unauthorized (external client test context): client received response status = 405
264932025-03-07T23:12:47.158ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264942025-03-07T23:12:47.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264952025-03-07T23:12:47.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef98d55e-44e1-4436-8fb7-f282fafc312d uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264962025-03-07T23:12:47.159ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ef98d55e-44e1-4436-8fb7-f282fafc312d response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264972025-03-07T23:12:47.159ZINFOtest_unauthorized (external client test context): client received response status = 405
264982025-03-07T23:12:47.159ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
264992025-03-07T23:12:47.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265002025-03-07T23:12:47.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265012025-03-07T23:12:47.159ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265022025-03-07T23:12:47.159ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265032025-03-07T23:12:47.159ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265042025-03-07T23:12:47.159ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265052025-03-07T23:12:47.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265062025-03-07T23:12:47.159ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265072025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265082025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265092025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
265102025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
265112025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265122025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265132025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265142025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
265152025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265162025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265172025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265182025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
265192025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
265202025-03-07T23:12:47.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265212025-03-07T23:12:47.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265222025-03-07T23:12:47.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265232025-03-07T23:12:47.163ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
265242025-03-07T23:12:47.164ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
265252025-03-07T23:12:47.164ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265262025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265272025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265282025-03-07T23:12:47.165ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
265292025-03-07T23:12:47.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265302025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265312025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265322025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
265332025-03-07T23:12:47.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
265342025-03-07T23:12:47.165ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265352025-03-07T23:12:47.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265362025-03-07T23:12:47.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265372025-03-07T23:12:47.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265382025-03-07T23:12:47.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265392025-03-07T23:12:47.166ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265402025-03-07T23:12:47.167ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265412025-03-07T23:12:47.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265422025-03-07T23:12:47.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265432025-03-07T23:12:47.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265442025-03-07T23:12:47.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265452025-03-07T23:12:47.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265462025-03-07T23:12:47.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265472025-03-07T23:12:47.177ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 43525 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 24105455-0831-4f65-a9df-60bec8409a79 response_code = 404 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265482025-03-07T23:12:47.178ZINFOtest_unauthorized (external client test context): client received response status = 404
265492025-03-07T23:12:47.178ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265502025-03-07T23:12:47.179ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265512025-03-07T23:12:47.179ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3ddf8989-4a7e-4f50-86c1-92a84f329d45 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265522025-03-07T23:12:47.179ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3ddf8989-4a7e-4f50-86c1-92a84f329d45 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265532025-03-07T23:12:47.179ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3ddf8989-4a7e-4f50-86c1-92a84f329d45 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265542025-03-07T23:12:47.179ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3ddf8989-4a7e-4f50-86c1-92a84f329d45 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265552025-03-07T23:12:47.179ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 380 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3ddf8989-4a7e-4f50-86c1-92a84f329d45 response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265562025-03-07T23:12:47.186ZINFOtest_unauthorized (external client test context): client received response status = 401
265572025-03-07T23:12:47.188ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265582025-03-07T23:12:47.188ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265592025-03-07T23:12:47.188ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d60e59f7-13f4-4edc-918f-517b9573eddf uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265602025-03-07T23:12:47.188ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d60e59f7-13f4-4edc-918f-517b9573eddf uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265612025-03-07T23:12:47.188ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d60e59f7-13f4-4edc-918f-517b9573eddf uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265622025-03-07T23:12:47.188ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 199 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d60e59f7-13f4-4edc-918f-517b9573eddf response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265632025-03-07T23:12:47.188ZINFOtest_unauthorized (external client test context): client received response status = 401
265642025-03-07T23:12:47.188ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265652025-03-07T23:12:47.188ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265662025-03-07T23:12:47.190ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1d37c385-eaf0-4c35-a2b7-fe441ee165f8 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265672025-03-07T23:12:47.190ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1d37c385-eaf0-4c35-a2b7-fe441ee165f8 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265682025-03-07T23:12:47.190ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5821:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5842:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1d37c385-eaf0-4c35-a2b7-fe441ee165f8 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265692025-03-07T23:12:47.190ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 964 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1d37c385-eaf0-4c35-a2b7-fe441ee165f8 response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265702025-03-07T23:12:47.190ZINFOtest_unauthorized (external client test context): client received response status = 401
265712025-03-07T23:12:47.190ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265722025-03-07T23:12:47.190ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265732025-03-07T23:12:47.190ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0d1427a5-9281-4670-91ce-3219ea79445f uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265742025-03-07T23:12:47.191ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0d1427a5-9281-4670-91ce-3219ea79445f response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265752025-03-07T23:12:47.191ZINFOtest_unauthorized (external client test context): client received response status = 405
265762025-03-07T23:12:47.191ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265772025-03-07T23:12:47.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265782025-03-07T23:12:47.191ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4b00e663-603d-4717-bf87-01342b70a784 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265792025-03-07T23:12:47.191ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4b00e663-603d-4717-bf87-01342b70a784 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265802025-03-07T23:12:47.191ZINFOtest_unauthorized (external client test context): client received response status = 405
265812025-03-07T23:12:47.191ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265822025-03-07T23:12:47.191ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265832025-03-07T23:12:47.191ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b12d6837-f9af-4951-bf71-e611b12e3d42 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265842025-03-07T23:12:47.191ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b12d6837-f9af-4951-bf71-e611b12e3d42 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265852025-03-07T23:12:47.191ZINFOtest_unauthorized (external client test context): client received response status = 405
265862025-03-07T23:12:47.192ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265872025-03-07T23:12:47.192ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265882025-03-07T23:12:47.193ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd31954f-c11b-4293-b4e2-c74e5859a419 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265892025-03-07T23:12:47.193ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd31954f-c11b-4293-b4e2-c74e5859a419 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265902025-03-07T23:12:47.193ZINFOtest_unauthorized (external client test context): client received response status = 405
265912025-03-07T23:12:47.193ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265922025-03-07T23:12:47.193ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265932025-03-07T23:12:47.193ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265942025-03-07T23:12:47.193ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265952025-03-07T23:12:47.193ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265962025-03-07T23:12:47.193ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265972025-03-07T23:12:47.193ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265982025-03-07T23:12:47.193ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
265992025-03-07T23:12:47.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266002025-03-07T23:12:47.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266012025-03-07T23:12:47.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266022025-03-07T23:12:47.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266032025-03-07T23:12:47.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266042025-03-07T23:12:47.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266052025-03-07T23:12:47.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
266062025-03-07T23:12:47.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
266072025-03-07T23:12:47.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266082025-03-07T23:12:47.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266092025-03-07T23:12:47.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266102025-03-07T23:12:47.200ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
266112025-03-07T23:12:47.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266122025-03-07T23:12:47.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266132025-03-07T23:12:47.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266142025-03-07T23:12:47.206ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
266152025-03-07T23:12:47.210ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
266162025-03-07T23:12:47.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266172025-03-07T23:12:47.220ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266182025-03-07T23:12:47.220ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266192025-03-07T23:12:47.221ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
266202025-03-07T23:12:47.221ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
266212025-03-07T23:12:47.221ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266222025-03-07T23:12:47.221ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266232025-03-07T23:12:47.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266242025-03-07T23:12:47.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
266252025-03-07T23:12:47.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
266262025-03-07T23:12:47.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
266272025-03-07T23:12:47.221ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
266282025-03-07T23:12:47.222ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
266292025-03-07T23:12:47.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266302025-03-07T23:12:47.225ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266312025-03-07T23:12:47.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266322025-03-07T23:12:47.228ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
266332025-03-07T23:12:47.230ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
266342025-03-07T23:12:47.232ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266352025-03-07T23:12:47.233ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266362025-03-07T23:12:47.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266372025-03-07T23:12:47.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266382025-03-07T23:12:47.234ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
266392025-03-07T23:12:47.236ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
266402025-03-07T23:12:47.236ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266412025-03-07T23:12:47.236ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266422025-03-07T23:12:47.236ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266432025-03-07T23:12:47.239ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266442025-03-07T23:12:47.242ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266452025-03-07T23:12:47.242ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266462025-03-07T23:12:47.242ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266472025-03-07T23:12:47.242ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266482025-03-07T23:12:47.242ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266492025-03-07T23:12:47.242ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
266502025-03-07T23:12:47.243ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
266512025-03-07T23:12:47.245ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 59157 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 54717269-d269-4e2a-a22c-247b138a1d54 response_code = 404 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266522025-03-07T23:12:47.246ZINFOtest_unauthorized (external client test context): client received response status = 404
266532025-03-07T23:12:47.246ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266542025-03-07T23:12:47.246ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266552025-03-07T23:12:47.246ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9908d156-c835-43a9-8e55-d2b34de3c6a0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266562025-03-07T23:12:47.246ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9908d156-c835-43a9-8e55-d2b34de3c6a0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266572025-03-07T23:12:47.246ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9908d156-c835-43a9-8e55-d2b34de3c6a0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266582025-03-07T23:12:47.246ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9908d156-c835-43a9-8e55-d2b34de3c6a0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266592025-03-07T23:12:47.246ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 357 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9908d156-c835-43a9-8e55-d2b34de3c6a0 response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266602025-03-07T23:12:47.246ZINFOtest_unauthorized (external client test context): client received response status = 401
266612025-03-07T23:12:47.246ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266622025-03-07T23:12:47.247ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266632025-03-07T23:12:47.247ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc2b2517-a1a7-40fa-bce2-f68c255ad29f uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266642025-03-07T23:12:47.249ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc2b2517-a1a7-40fa-bce2-f68c255ad29f uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266652025-03-07T23:12:47.249ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc2b2517-a1a7-40fa-bce2-f68c255ad29f uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266662025-03-07T23:12:47.249ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1318 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fc2b2517-a1a7-40fa-bce2-f68c255ad29f response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266672025-03-07T23:12:47.249ZINFOtest_unauthorized (external client test context): client received response status = 401
266682025-03-07T23:12:47.250ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266692025-03-07T23:12:47.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266702025-03-07T23:12:47.250ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f825d92b-de22-48a8-a844-6252d457fe2e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266712025-03-07T23:12:47.250ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f825d92b-de22-48a8-a844-6252d457fe2e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266722025-03-07T23:12:47.250ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5858:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5888:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f825d92b-de22-48a8-a844-6252d457fe2e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266732025-03-07T23:12:47.250ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1048 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f825d92b-de22-48a8-a844-6252d457fe2e response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266742025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client received response status = 401
266752025-03-07T23:12:47.252ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266762025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266772025-03-07T23:12:47.252ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 542a7c39-4077-4b26-b965-c0a840517564 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266782025-03-07T23:12:47.252ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 542a7c39-4077-4b26-b965-c0a840517564 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266792025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client received response status = 405
266802025-03-07T23:12:47.252ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266812025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266822025-03-07T23:12:47.252ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 580af195-8c33-4388-82b3-6662e874c8d9 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266832025-03-07T23:12:47.252ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 580af195-8c33-4388-82b3-6662e874c8d9 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266842025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client received response status = 405
266852025-03-07T23:12:47.252ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266862025-03-07T23:12:47.252ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266872025-03-07T23:12:47.252ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fcd4c627-869f-4cd5-bd6c-6261d56ec442 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266882025-03-07T23:12:47.253ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fcd4c627-869f-4cd5-bd6c-6261d56ec442 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266892025-03-07T23:12:47.265ZINFOtest_unauthorized (external client test context): client received response status = 405
266902025-03-07T23:12:47.266ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266912025-03-07T23:12:47.266ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266922025-03-07T23:12:47.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b3824582-129a-4cb4-9a2b-e38a29ea7fd2 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266932025-03-07T23:12:47.266ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b3824582-129a-4cb4-9a2b-e38a29ea7fd2 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266942025-03-07T23:12:47.266ZINFOtest_unauthorized (external client test context): client received response status = 405
266952025-03-07T23:12:47.266ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266962025-03-07T23:12:47.266ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266972025-03-07T23:12:47.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266982025-03-07T23:12:47.266ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
266992025-03-07T23:12:47.267ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267002025-03-07T23:12:47.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267012025-03-07T23:12:47.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267022025-03-07T23:12:47.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267032025-03-07T23:12:47.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267042025-03-07T23:12:47.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267052025-03-07T23:12:47.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267062025-03-07T23:12:47.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
267072025-03-07T23:12:47.269ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
267082025-03-07T23:12:47.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267092025-03-07T23:12:47.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267102025-03-07T23:12:47.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267112025-03-07T23:12:47.274ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
267122025-03-07T23:12:47.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267132025-03-07T23:12:47.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267142025-03-07T23:12:47.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267152025-03-07T23:12:47.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
267162025-03-07T23:12:47.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
267172025-03-07T23:12:47.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267182025-03-07T23:12:47.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267192025-03-07T23:12:47.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267202025-03-07T23:12:47.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
267212025-03-07T23:12:47.289ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
267222025-03-07T23:12:47.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267232025-03-07T23:12:47.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267242025-03-07T23:12:47.289ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267252025-03-07T23:12:47.290ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
267262025-03-07T23:12:47.290ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267272025-03-07T23:12:47.290ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267282025-03-07T23:12:47.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267292025-03-07T23:12:47.294ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
267302025-03-07T23:12:47.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
267312025-03-07T23:12:47.298ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267322025-03-07T23:12:47.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267332025-03-07T23:12:47.299ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267342025-03-07T23:12:47.299ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267352025-03-07T23:12:47.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267362025-03-07T23:12:47.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267372025-03-07T23:12:47.317ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267382025-03-07T23:12:47.321ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
267392025-03-07T23:12:47.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267402025-03-07T23:12:47.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267412025-03-07T23:12:47.323ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267422025-03-07T23:12:47.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267432025-03-07T23:12:47.325ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267442025-03-07T23:12:47.326ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267452025-03-07T23:12:47.329ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 75821 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 364a3a04-e6d4-4ac6-ab83-cead2896a932 response_code = 404 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267462025-03-07T23:12:47.329ZINFOtest_unauthorized (external client test context): client received response status = 404
267472025-03-07T23:12:47.329ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267482025-03-07T23:12:47.329ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267492025-03-07T23:12:47.329ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 495cc136-0a0f-40d6-b5c0-0a79350cf8fb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267502025-03-07T23:12:47.330ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 495cc136-0a0f-40d6-b5c0-0a79350cf8fb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267512025-03-07T23:12:47.330ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 495cc136-0a0f-40d6-b5c0-0a79350cf8fb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267522025-03-07T23:12:47.330ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 495cc136-0a0f-40d6-b5c0-0a79350cf8fb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267532025-03-07T23:12:47.330ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 451 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 495cc136-0a0f-40d6-b5c0-0a79350cf8fb response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267542025-03-07T23:12:47.330ZINFOtest_unauthorized (external client test context): client received response status = 401
267552025-03-07T23:12:47.330ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267562025-03-07T23:12:47.331ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267572025-03-07T23:12:47.331ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fa73f31d-44c4-41c1-986d-6cdb9c7f417e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267582025-03-07T23:12:47.331ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fa73f31d-44c4-41c1-986d-6cdb9c7f417e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267592025-03-07T23:12:47.331ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fa73f31d-44c4-41c1-986d-6cdb9c7f417e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267602025-03-07T23:12:47.331ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 238 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fa73f31d-44c4-41c1-986d-6cdb9c7f417e response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267612025-03-07T23:12:47.332ZINFOtest_unauthorized (external client test context): client received response status = 401
267622025-03-07T23:12:47.332ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267632025-03-07T23:12:47.332ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267642025-03-07T23:12:47.332ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 162bac1f-dc45-4e12-aeeb-a0d86925db2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267652025-03-07T23:12:47.332ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 162bac1f-dc45-4e12-aeeb-a0d86925db2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267662025-03-07T23:12:47.332ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5901:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5915:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 162bac1f-dc45-4e12-aeeb-a0d86925db2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267672025-03-07T23:12:47.332ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1044 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 162bac1f-dc45-4e12-aeeb-a0d86925db2b response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267682025-03-07T23:12:47.333ZINFOtest_unauthorized (external client test context): client received response status = 401
267692025-03-07T23:12:47.333ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267702025-03-07T23:12:47.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267712025-03-07T23:12:47.333ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8d07c661-2304-4731-a458-bf675a7e9e18 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267722025-03-07T23:12:47.333ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8d07c661-2304-4731-a458-bf675a7e9e18 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267732025-03-07T23:12:47.333ZINFOtest_unauthorized (external client test context): client received response status = 405
267742025-03-07T23:12:47.333ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267752025-03-07T23:12:47.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267762025-03-07T23:12:47.334ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d6934efd-2692-4288-8b7e-f1b58c8ab2c4 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267772025-03-07T23:12:47.334ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d6934efd-2692-4288-8b7e-f1b58c8ab2c4 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267782025-03-07T23:12:47.334ZINFOtest_unauthorized (external client test context): client received response status = 405
267792025-03-07T23:12:47.334ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267802025-03-07T23:12:47.334ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267812025-03-07T23:12:47.334ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3639c86a-9c9b-41b3-9520-8dc38124b6e0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267822025-03-07T23:12:47.334ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3639c86a-9c9b-41b3-9520-8dc38124b6e0 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267832025-03-07T23:12:47.335ZINFOtest_unauthorized (external client test context): client received response status = 405
267842025-03-07T23:12:47.335ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267852025-03-07T23:12:47.335ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267862025-03-07T23:12:47.335ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9dbdd65d-9319-46ac-95e4-1bb409c03a39 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267872025-03-07T23:12:47.335ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9dbdd65d-9319-46ac-95e4-1bb409c03a39 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267882025-03-07T23:12:47.335ZINFOtest_unauthorized (external client test context): client received response status = 405
267892025-03-07T23:12:47.336ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267902025-03-07T23:12:47.336ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267912025-03-07T23:12:47.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e8e6069e-9ae3-438f-b028-050c17f8da87 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267922025-03-07T23:12:47.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = e8e6069e-9ae3-438f-b028-050c17f8da87 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267932025-03-07T23:12:47.336ZINFOtest_unauthorized (external client test context): client received response status = 405
267942025-03-07T23:12:47.336ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267952025-03-07T23:12:47.338ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267962025-03-07T23:12:47.338ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7cdc0024-82ec-4a14-8b57-a98dfb1d5a27 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267972025-03-07T23:12:47.338ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7cdc0024-82ec-4a14-8b57-a98dfb1d5a27 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
267982025-03-07T23:12:47.338ZINFOtest_unauthorized (external client test context): client received response status = 405
267992025-03-07T23:12:47.338ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268002025-03-07T23:12:47.338ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268012025-03-07T23:12:47.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c746c5f2-9924-4065-ba62-e77ca334017b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268022025-03-07T23:12:47.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c746c5f2-9924-4065-ba62-e77ca334017b response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268032025-03-07T23:12:47.339ZINFOtest_unauthorized (external client test context): client received response status = 405
268042025-03-07T23:12:47.341ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268052025-03-07T23:12:47.341ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268062025-03-07T23:12:47.341ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dfca0b58-b0c5-4a18-9067-03fd8a0fa16e uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268072025-03-07T23:12:47.341ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dfca0b58-b0c5-4a18-9067-03fd8a0fa16e response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268082025-03-07T23:12:47.341ZINFOtest_unauthorized (external client test context): client received response status = 405
268092025-03-07T23:12:47.341ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268102025-03-07T23:12:47.341ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268112025-03-07T23:12:47.341ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268122025-03-07T23:12:47.341ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268132025-03-07T23:12:47.342ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268142025-03-07T23:12:47.342ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3463b2bc-6207-407f-a0a4-9eb126bd9e90 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268152025-03-07T23:12:47.342ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3463b2bc-6207-407f-a0a4-9eb126bd9e90 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268162025-03-07T23:12:47.342ZINFOtest_unauthorized (external client test context): client received response status = 405
268172025-03-07T23:12:47.343ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268182025-03-07T23:12:47.343ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268192025-03-07T23:12:47.343ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07d12443-77a3-4ab6-997d-26b2fd6f1cfd uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268202025-03-07T23:12:47.343ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 161 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07d12443-77a3-4ab6-997d-26b2fd6f1cfd response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268212025-03-07T23:12:47.343ZINFOtest_unauthorized (external client test context): client received response status = 405
268222025-03-07T23:12:47.343ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268232025-03-07T23:12:47.343ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268242025-03-07T23:12:47.343ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 346ccdc4-a003-47fb-8dd9-ea52b710c7b3 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268252025-03-07T23:12:47.343ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 346ccdc4-a003-47fb-8dd9-ea52b710c7b3 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268262025-03-07T23:12:47.343ZINFOtest_unauthorized (external client test context): client received response status = 405
268272025-03-07T23:12:47.343ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268282025-03-07T23:12:47.343ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268292025-03-07T23:12:47.343ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ebfe7f4-9bc0-46ae-a3a2-b86735b1a2a6 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268302025-03-07T23:12:47.347ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ebfe7f4-9bc0-46ae-a3a2-b86735b1a2a6 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268312025-03-07T23:12:47.348ZINFOtest_unauthorized (external client test context): client received response status = 405
268322025-03-07T23:12:47.348ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268332025-03-07T23:12:47.348ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268342025-03-07T23:12:47.348ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 11ea1894-c2db-49a8-8add-05cad1211895 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268352025-03-07T23:12:47.348ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 11ea1894-c2db-49a8-8add-05cad1211895 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268362025-03-07T23:12:47.348ZINFOtest_unauthorized (external client test context): client received response status = 405
268372025-03-07T23:12:47.348ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268382025-03-07T23:12:47.348ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268392025-03-07T23:12:47.348ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4ba5dba9-2126-4734-9d7a-1e92cb9e1a4b uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268402025-03-07T23:12:47.348ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4ba5dba9-2126-4734-9d7a-1e92cb9e1a4b response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268412025-03-07T23:12:47.348ZINFOtest_unauthorized (external client test context): client received response status = 405
268422025-03-07T23:12:47.348ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268432025-03-07T23:12:47.350ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268442025-03-07T23:12:47.350ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 73c4b0e4-88bc-48f7-a6ee-bd2527dd0528 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268452025-03-07T23:12:47.350ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 73c4b0e4-88bc-48f7-a6ee-bd2527dd0528 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268462025-03-07T23:12:47.350ZINFOtest_unauthorized (external client test context): client received response status = 405
268472025-03-07T23:12:47.350ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268482025-03-07T23:12:47.350ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268492025-03-07T23:12:47.350ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d01e7de1-1de2-45c4-9115-a7403b683d4e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268502025-03-07T23:12:47.350ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d01e7de1-1de2-45c4-9115-a7403b683d4e response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268512025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client received response status = 405
268522025-03-07T23:12:47.351ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268532025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268542025-03-07T23:12:47.351ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f10268ff-8d44-49b0-b7da-7908179ada12 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268552025-03-07T23:12:47.351ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f10268ff-8d44-49b0-b7da-7908179ada12 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268562025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client received response status = 405
268572025-03-07T23:12:47.351ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268582025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268592025-03-07T23:12:47.351ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c0c9dabb-d1c2-44f9-80e2-db093f50ba14 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268602025-03-07T23:12:47.351ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c0c9dabb-d1c2-44f9-80e2-db093f50ba14 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268612025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client received response status = 405
268622025-03-07T23:12:47.351ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268632025-03-07T23:12:47.351ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268642025-03-07T23:12:47.351ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1ce157c5-42ff-45bd-aa6b-4678d9a18a8a uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268652025-03-07T23:12:47.352ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1ce157c5-42ff-45bd-aa6b-4678d9a18a8a response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268662025-03-07T23:12:47.352ZINFOtest_unauthorized (external client test context): client received response status = 405
268672025-03-07T23:12:47.352ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268682025-03-07T23:12:47.352ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268692025-03-07T23:12:47.352ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aff24c5d-502e-409f-a7ed-aad1cf613925 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268702025-03-07T23:12:47.352ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aff24c5d-502e-409f-a7ed-aad1cf613925 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268712025-03-07T23:12:47.352ZINFOtest_unauthorized (external client test context): client received response status = 405
268722025-03-07T23:12:47.352ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268732025-03-07T23:12:47.352ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268742025-03-07T23:12:47.352ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268752025-03-07T23:12:47.352ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268762025-03-07T23:12:47.355ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
268772025-03-07T23:12:47.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268782025-03-07T23:12:47.356ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268792025-03-07T23:12:47.356ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268802025-03-07T23:12:47.356ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268812025-03-07T23:12:47.373ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268822025-03-07T23:12:47.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268832025-03-07T23:12:47.374ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
268842025-03-07T23:12:47.374ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
268852025-03-07T23:12:47.374ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268862025-03-07T23:12:47.374ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268872025-03-07T23:12:47.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268882025-03-07T23:12:47.379ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
268892025-03-07T23:12:47.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268902025-03-07T23:12:47.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268912025-03-07T23:12:47.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268922025-03-07T23:12:47.386ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
268932025-03-07T23:12:47.395ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
268942025-03-07T23:12:47.395ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268952025-03-07T23:12:47.395ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268962025-03-07T23:12:47.395ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268972025-03-07T23:12:47.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
268982025-03-07T23:12:47.396ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
268992025-03-07T23:12:47.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269002025-03-07T23:12:47.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269012025-03-07T23:12:47.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269022025-03-07T23:12:47.396ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
269032025-03-07T23:12:47.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269042025-03-07T23:12:47.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269052025-03-07T23:12:47.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269062025-03-07T23:12:47.401ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
269072025-03-07T23:12:47.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
269082025-03-07T23:12:47.409ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269092025-03-07T23:12:47.409ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269102025-03-07T23:12:47.409ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269112025-03-07T23:12:47.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269122025-03-07T23:12:47.414ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269132025-03-07T23:12:47.415ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269142025-03-07T23:12:47.415ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269152025-03-07T23:12:47.418ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269162025-03-07T23:12:47.418ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269172025-03-07T23:12:47.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269182025-03-07T23:12:47.422ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269192025-03-07T23:12:47.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269202025-03-07T23:12:47.423ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269212025-03-07T23:12:47.425ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 74689 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 73732d91-c04a-463b-83b9-099bae784935 response_code = 404 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269222025-03-07T23:12:47.426ZINFOtest_unauthorized (external client test context): client received response status = 404
269232025-03-07T23:12:47.426ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269242025-03-07T23:12:47.426ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269252025-03-07T23:12:47.426ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d161a433-0584-4d22-b01f-baaafa7e6662 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269262025-03-07T23:12:47.426ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d161a433-0584-4d22-b01f-baaafa7e6662 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269272025-03-07T23:12:47.426ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d161a433-0584-4d22-b01f-baaafa7e6662 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269282025-03-07T23:12:47.426ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d161a433-0584-4d22-b01f-baaafa7e6662 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269292025-03-07T23:12:47.427ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 537 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d161a433-0584-4d22-b01f-baaafa7e6662 response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269302025-03-07T23:12:47.427ZINFOtest_unauthorized (external client test context): client received response status = 401
269312025-03-07T23:12:47.427ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269322025-03-07T23:12:47.427ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269332025-03-07T23:12:47.427ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9f77c114-7396-41e6-a98d-4aac6ab4d9a6 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269342025-03-07T23:12:47.428ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9f77c114-7396-41e6-a98d-4aac6ab4d9a6 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269352025-03-07T23:12:47.428ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9f77c114-7396-41e6-a98d-4aac6ab4d9a6 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269362025-03-07T23:12:47.428ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 389 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9f77c114-7396-41e6-a98d-4aac6ab4d9a6 response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269372025-03-07T23:12:47.429ZINFOtest_unauthorized (external client test context): client received response status = 401
269382025-03-07T23:12:47.429ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269392025-03-07T23:12:47.429ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269402025-03-07T23:12:47.429ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c61d37b-b883-4e0c-a8d0-59f72fc8f67f uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269412025-03-07T23:12:47.429ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c61d37b-b883-4e0c-a8d0-59f72fc8f67f uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269422025-03-07T23:12:47.430ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5927:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5952:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c61d37b-b883-4e0c-a8d0-59f72fc8f67f uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269432025-03-07T23:12:47.430ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 949 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c61d37b-b883-4e0c-a8d0-59f72fc8f67f response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269442025-03-07T23:12:47.430ZINFOtest_unauthorized (external client test context): client received response status = 401
269452025-03-07T23:12:47.430ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269462025-03-07T23:12:47.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269472025-03-07T23:12:47.430ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eafb05e0-3072-4681-80d9-5052d511b5b1 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269482025-03-07T23:12:47.430ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = eafb05e0-3072-4681-80d9-5052d511b5b1 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269492025-03-07T23:12:47.430ZINFOtest_unauthorized (external client test context): client received response status = 405
269502025-03-07T23:12:47.430ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269512025-03-07T23:12:47.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269522025-03-07T23:12:47.431ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f1cde522-900d-489d-acc7-b7d59c45ee2e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269532025-03-07T23:12:47.432ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f1cde522-900d-489d-acc7-b7d59c45ee2e response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269542025-03-07T23:12:47.432ZINFOtest_unauthorized (external client test context): client received response status = 405
269552025-03-07T23:12:47.432ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269562025-03-07T23:12:47.432ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269572025-03-07T23:12:47.432ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4e9efc97-103f-4ce5-bf46-060f9ae48134 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269582025-03-07T23:12:47.432ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4e9efc97-103f-4ce5-bf46-060f9ae48134 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269592025-03-07T23:12:47.432ZINFOtest_unauthorized (external client test context): client received response status = 405
269602025-03-07T23:12:47.433ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269612025-03-07T23:12:47.433ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269622025-03-07T23:12:47.434ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ea0eb135-909e-484c-9dad-2ea0da58d5b0 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269632025-03-07T23:12:47.434ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ea0eb135-909e-484c-9dad-2ea0da58d5b0 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269642025-03-07T23:12:47.434ZINFOtest_unauthorized (external client test context): client received response status = 405
269652025-03-07T23:12:47.434ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269662025-03-07T23:12:47.435ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks?project=demo-project
269672025-03-07T23:12:47.435ZINFOtest_unauthorized: test: privileged GET url = /v1/disks?project=demo-project
269682025-03-07T23:12:47.435ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
269692025-03-07T23:12:47.435ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff uri = /v1/disks?project=demo-project
269702025-03-07T23:12:47.435ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff uri = /v1/disks?project=demo-project
269712025-03-07T23:12:47.435ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
269722025-03-07T23:12:47.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269732025-03-07T23:12:47.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269742025-03-07T23:12:47.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269752025-03-07T23:12:47.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269762025-03-07T23:12:47.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269772025-03-07T23:12:47.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269782025-03-07T23:12:47.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
269792025-03-07T23:12:47.439ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
269802025-03-07T23:12:47.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269812025-03-07T23:12:47.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269822025-03-07T23:12:47.439ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269832025-03-07T23:12:47.441ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
269842025-03-07T23:12:47.441ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269852025-03-07T23:12:47.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269862025-03-07T23:12:47.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269872025-03-07T23:12:47.444ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
269882025-03-07T23:12:47.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
269892025-03-07T23:12:47.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269902025-03-07T23:12:47.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269912025-03-07T23:12:47.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269922025-03-07T23:12:47.452ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
269932025-03-07T23:12:47.453ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
269942025-03-07T23:12:47.453ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269952025-03-07T23:12:47.453ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269962025-03-07T23:12:47.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269972025-03-07T23:12:47.457ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
269982025-03-07T23:12:47.457ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269992025-03-07T23:12:47.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270002025-03-07T23:12:47.458ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270012025-03-07T23:12:47.460ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
270022025-03-07T23:12:47.464ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
270032025-03-07T23:12:47.467ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff uri = /v1/disks?project=demo-project
270042025-03-07T23:12:47.467ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270052025-03-07T23:12:47.467ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270062025-03-07T23:12:47.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270072025-03-07T23:12:47.467ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270082025-03-07T23:12:47.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270092025-03-07T23:12:47.469ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270102025-03-07T23:12:47.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
270112025-03-07T23:12:47.472ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
270122025-03-07T23:12:47.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270132025-03-07T23:12:47.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270142025-03-07T23:12:47.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270152025-03-07T23:12:47.476ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
270162025-03-07T23:12:47.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270172025-03-07T23:12:47.477ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270182025-03-07T23:12:47.477ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270192025-03-07T23:12:47.481ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
270202025-03-07T23:12:47.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270212025-03-07T23:12:47.482ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270222025-03-07T23:12:47.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270232025-03-07T23:12:47.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
270242025-03-07T23:12:47.496ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
270252025-03-07T23:12:47.496ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
270262025-03-07T23:12:47.497ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
270272025-03-07T23:12:47.497ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270282025-03-07T23:12:47.497ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270292025-03-07T23:12:47.497ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270302025-03-07T23:12:47.500ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
270312025-03-07T23:12:47.501ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270322025-03-07T23:12:47.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270332025-03-07T23:12:47.502ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270342025-03-07T23:12:47.504ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
270352025-03-07T23:12:47.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270362025-03-07T23:12:47.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270372025-03-07T23:12:47.506ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270382025-03-07T23:12:47.518ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
270392025-03-07T23:12:47.526ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
270402025-03-07T23:12:47.526ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database uri = /v1/disks?project=demo-project
270412025-03-07T23:12:47.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270422025-03-07T23:12:47.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270432025-03-07T23:12:47.531ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 99228 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f3b3c59f-9af0-48c0-8fd6-1ac5d54da7ff response_code = 200 uri = /v1/disks?project=demo-project
270442025-03-07T23:12:47.539ZINFOtest_unauthorized (external client test context): client received response status = 200
270452025-03-07T23:12:47.539ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks?project=demo-project
270462025-03-07T23:12:47.539ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
270472025-03-07T23:12:47.539ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 uri = /v1/disks?project=demo-project
270482025-03-07T23:12:47.539ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 uri = /v1/disks?project=demo-project
270492025-03-07T23:12:47.539ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks?project=demo-project
270502025-03-07T23:12:47.539ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270512025-03-07T23:12:47.539ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270522025-03-07T23:12:47.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270532025-03-07T23:12:47.539ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270542025-03-07T23:12:47.539ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270552025-03-07T23:12:47.540ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270562025-03-07T23:12:47.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
270572025-03-07T23:12:47.544ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
270582025-03-07T23:12:47.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270592025-03-07T23:12:47.544ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270602025-03-07T23:12:47.544ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270612025-03-07T23:12:47.545ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
270622025-03-07T23:12:47.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270632025-03-07T23:12:47.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270642025-03-07T23:12:47.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270652025-03-07T23:12:47.549ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
270662025-03-07T23:12:47.555ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
270672025-03-07T23:12:47.556ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270682025-03-07T23:12:47.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270692025-03-07T23:12:47.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270702025-03-07T23:12:47.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
270712025-03-07T23:12:47.559ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
270722025-03-07T23:12:47.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270732025-03-07T23:12:47.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270742025-03-07T23:12:47.560ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270752025-03-07T23:12:47.563ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
270762025-03-07T23:12:47.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270772025-03-07T23:12:47.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270782025-03-07T23:12:47.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270792025-03-07T23:12:47.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
270802025-03-07T23:12:47.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
270812025-03-07T23:12:47.570ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 uri = /v1/disks?project=demo-project
270822025-03-07T23:12:47.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database uri = /v1/disks?project=demo-project
270832025-03-07T23:12:47.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270842025-03-07T23:12:47.572ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270852025-03-07T23:12:47.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
270862025-03-07T23:12:47.572ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270872025-03-07T23:12:47.573ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 14cfc495-6d5f-4557-9a0a-77e3f7932271 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270882025-03-07T23:12:47.573ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 14cfc495-6d5f-4557-9a0a-77e3f7932271 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270892025-03-07T23:12:47.573ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 14cfc495-6d5f-4557-9a0a-77e3f7932271 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270902025-03-07T23:12:47.574ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 14cfc495-6d5f-4557-9a0a-77e3f7932271 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270912025-03-07T23:12:47.574ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database uri = /v1/disks?project=demo-project
270922025-03-07T23:12:47.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
270932025-03-07T23:12:47.575ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
270942025-03-07T23:12:47.577ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4322 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 14cfc495-6d5f-4557-9a0a-77e3f7932271 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
270952025-03-07T23:12:47.578ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "14cfc495-6d5f-4557-9a0a-77e3f7932271", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:47 GMT"} })
270962025-03-07T23:12:47.578ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
270972025-03-07T23:12:47.578ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
270982025-03-07T23:12:47.580ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
270992025-03-07T23:12:47.580ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database uri = /v1/disks?project=demo-project
271002025-03-07T23:12:47.580ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
271012025-03-07T23:12:47.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
271022025-03-07T23:12:47.580ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f9ffecae-d179-4ce6-b8aa-e36aabc944ba uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
271032025-03-07T23:12:47.582ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f9ffecae-d179-4ce6-b8aa-e36aabc944ba resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
271042025-03-07T23:12:47.583ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f9ffecae-d179-4ce6-b8aa-e36aabc944ba roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
271052025-03-07T23:12:47.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f9ffecae-d179-4ce6-b8aa-e36aabc944ba resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
271062025-03-07T23:12:47.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5130 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = f9ffecae-d179-4ce6-b8aa-e36aabc944ba response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
271072025-03-07T23:12:47.586ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
271082025-03-07T23:12:47.586ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database uri = /v1/disks?project=demo-project
271092025-03-07T23:12:47.586ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
271102025-03-07T23:12:47.587ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
271112025-03-07T23:12:47.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271122025-03-07T23:12:47.591ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9ffecae-d179-4ce6-b8aa-e36aabc944ba", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:47 GMT"} })
271132025-03-07T23:12:47.591ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271142025-03-07T23:12:47.591ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
271152025-03-07T23:12:47.591ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
271162025-03-07T23:12:47.591ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271172025-03-07T23:12:47.592ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271182025-03-07T23:12:47.593ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271192025-03-07T23:12:47.595ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271202025-03-07T23:12:47.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
271212025-03-07T23:12:47.595ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
271222025-03-07T23:12:47.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database uri = /v1/disks?project=demo-project
271232025-03-07T23:12:47.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
271242025-03-07T23:12:47.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
271252025-03-07T23:12:47.598ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
271262025-03-07T23:12:47.620ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/disks?project=demo-project
271272025-03-07T23:12:47.621ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 86724 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 37231b84-4754-4bf7-a58d-731441d71725 response_code = 404 uri = /v1/disks?project=demo-project
271282025-03-07T23:12:47.621ZINFOtest_unauthorized (external client test context): client received response status = 404
271292025-03-07T23:12:47.621ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks?project=demo-project
271302025-03-07T23:12:47.621ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271312025-03-07T23:12:47.621ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 85ab89b4-008e-434a-8e8c-0c3ace9f4a96 uri = /v1/disks?project=demo-project
271322025-03-07T23:12:47.621ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 85ab89b4-008e-434a-8e8c-0c3ace9f4a96 uri = /v1/disks?project=demo-project
271332025-03-07T23:12:47.622ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 85ab89b4-008e-434a-8e8c-0c3ace9f4a96 uri = /v1/disks?project=demo-project
271342025-03-07T23:12:47.622ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 85ab89b4-008e-434a-8e8c-0c3ace9f4a96 uri = /v1/disks?project=demo-project
271352025-03-07T23:12:47.622ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 407 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 85ab89b4-008e-434a-8e8c-0c3ace9f4a96 response_code = 401 uri = /v1/disks?project=demo-project
271362025-03-07T23:12:47.622ZINFOtest_unauthorized (external client test context): client received response status = 401
271372025-03-07T23:12:47.623ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks?project=demo-project
271382025-03-07T23:12:47.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271392025-03-07T23:12:47.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a3f625a2-4e37-435b-be32-811f35e5a7f8 uri = /v1/disks?project=demo-project
271402025-03-07T23:12:47.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a3f625a2-4e37-435b-be32-811f35e5a7f8 uri = /v1/disks?project=demo-project
271412025-03-07T23:12:47.623ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a3f625a2-4e37-435b-be32-811f35e5a7f8 uri = /v1/disks?project=demo-project
271422025-03-07T23:12:47.623ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 253 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a3f625a2-4e37-435b-be32-811f35e5a7f8 response_code = 401 uri = /v1/disks?project=demo-project
271432025-03-07T23:12:47.623ZINFOtest_unauthorized (external client test context): client received response status = 401
271442025-03-07T23:12:47.623ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks?project=demo-project
271452025-03-07T23:12:47.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271462025-03-07T23:12:47.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6971161c-f870-4e98-8c6f-67b74224147a uri = /v1/disks?project=demo-project
271472025-03-07T23:12:47.624ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6971161c-f870-4e98-8c6f-67b74224147a uri = /v1/disks?project=demo-project
271482025-03-07T23:12:47.625ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1755:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1779:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6971161c-f870-4e98-8c6f-67b74224147a uri = /v1/disks?project=demo-project
271492025-03-07T23:12:47.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1727 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6971161c-f870-4e98-8c6f-67b74224147a response_code = 401 uri = /v1/disks?project=demo-project
271502025-03-07T23:12:47.626ZINFOtest_unauthorized (external client test context): client received response status = 401
271512025-03-07T23:12:47.626ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks?project=demo-project
271522025-03-07T23:12:47.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271532025-03-07T23:12:47.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 913fd126-b136-42d4-86a4-4146f5a5b690 uri = /v1/disks?project=demo-project
271542025-03-07T23:12:47.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 913fd126-b136-42d4-86a4-4146f5a5b690 response_code = 405 uri = /v1/disks?project=demo-project
271552025-03-07T23:12:47.626ZINFOtest_unauthorized (external client test context): client received response status = 405
271562025-03-07T23:12:47.626ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks?project=demo-project
271572025-03-07T23:12:47.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271582025-03-07T23:12:47.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5eccdbf7-0e3a-49b3-9fd6-d5300cb254b0 uri = /v1/disks?project=demo-project
271592025-03-07T23:12:47.627ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 5eccdbf7-0e3a-49b3-9fd6-d5300cb254b0 response_code = 405 uri = /v1/disks?project=demo-project
271602025-03-07T23:12:47.627ZINFOtest_unauthorized (external client test context): client received response status = 405
271612025-03-07T23:12:47.627ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks?project=demo-project
271622025-03-07T23:12:47.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271632025-03-07T23:12:47.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 16b8710a-6bb2-4d39-a3f6-6dcbf8d4a63f uri = /v1/disks?project=demo-project
271642025-03-07T23:12:47.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 16b8710a-6bb2-4d39-a3f6-6dcbf8d4a63f response_code = 405 uri = /v1/disks?project=demo-project
271652025-03-07T23:12:47.629ZINFOtest_unauthorized (external client test context): client received response status = 405
271662025-03-07T23:12:47.629ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks?project=demo-project
271672025-03-07T23:12:47.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271682025-03-07T23:12:47.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d99b07a8-1baf-43ae-83f3-167c7c0d4b07 uri = /v1/disks?project=demo-project
271692025-03-07T23:12:47.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d99b07a8-1baf-43ae-83f3-167c7c0d4b07 response_code = 405 uri = /v1/disks?project=demo-project
271702025-03-07T23:12:47.630ZINFOtest_unauthorized (external client test context): client received response status = 405
271712025-03-07T23:12:47.630ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks?project=demo-project
271722025-03-07T23:12:47.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
271732025-03-07T23:12:47.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b uri = /v1/disks?project=demo-project
271742025-03-07T23:12:47.630ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b uri = /v1/disks?project=demo-project
271752025-03-07T23:12:47.630ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks?project=demo-project
271762025-03-07T23:12:47.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271772025-03-07T23:12:47.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271782025-03-07T23:12:47.631ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271792025-03-07T23:12:47.632ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271802025-03-07T23:12:47.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271812025-03-07T23:12:47.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271822025-03-07T23:12:47.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
271832025-03-07T23:12:47.637ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
271842025-03-07T23:12:47.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271852025-03-07T23:12:47.638ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271862025-03-07T23:12:47.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271872025-03-07T23:12:47.641ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
271882025-03-07T23:12:47.641ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271892025-03-07T23:12:47.641ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271902025-03-07T23:12:47.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271912025-03-07T23:12:47.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
271922025-03-07T23:12:47.649ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
271932025-03-07T23:12:47.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271942025-03-07T23:12:47.649ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271952025-03-07T23:12:47.650ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271962025-03-07T23:12:47.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
271972025-03-07T23:12:47.654ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
271982025-03-07T23:12:47.654ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271992025-03-07T23:12:47.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272002025-03-07T23:12:47.654ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272012025-03-07T23:12:47.656ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
272022025-03-07T23:12:47.656ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272032025-03-07T23:12:47.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272042025-03-07T23:12:47.660ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272052025-03-07T23:12:47.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
272062025-03-07T23:12:47.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
272072025-03-07T23:12:47.665ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b uri = /v1/disks?project=demo-project
272082025-03-07T23:12:47.666ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database uri = /v1/disks?project=demo-project
272092025-03-07T23:12:47.666ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272102025-03-07T23:12:47.666ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
272112025-03-07T23:12:47.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database uri = /v1/disks?project=demo-project
272122025-03-07T23:12:47.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272132025-03-07T23:12:47.669ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
272142025-03-07T23:12:47.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
272152025-03-07T23:12:47.671ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
272162025-03-07T23:12:47.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database uri = /v1/disks?project=demo-project
272172025-03-07T23:12:47.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272182025-03-07T23:12:47.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
272192025-03-07T23:12:47.681ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
272202025-03-07T23:12:47.681ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database uri = /v1/disks?project=demo-project
272212025-03-07T23:12:47.681ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272222025-03-07T23:12:47.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
272232025-03-07T23:12:47.685ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
272242025-03-07T23:12:47.685ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database uri = /v1/disks?project=demo-project
272252025-03-07T23:12:47.685ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272262025-03-07T23:12:47.686ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
272272025-03-07T23:12:47.689ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
272282025-03-07T23:12:47.705ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/disks?project=demo-project
272292025-03-07T23:12:47.706ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 76656 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c827f361-2e38-4498-afd7-52de76b0ea1b response_code = 404 uri = /v1/disks?project=demo-project
272302025-03-07T23:12:47.706ZINFOtest_unauthorized (external client test context): client received response status = 404
272312025-03-07T23:12:47.706ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks?project=demo-project
272322025-03-07T23:12:47.706ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272332025-03-07T23:12:47.715ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 15b6cec4-eae2-4e8f-a452-add56337f94c uri = /v1/disks?project=demo-project
272342025-03-07T23:12:47.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 15b6cec4-eae2-4e8f-a452-add56337f94c uri = /v1/disks?project=demo-project
272352025-03-07T23:12:47.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 15b6cec4-eae2-4e8f-a452-add56337f94c uri = /v1/disks?project=demo-project
272362025-03-07T23:12:47.716ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 15b6cec4-eae2-4e8f-a452-add56337f94c uri = /v1/disks?project=demo-project
272372025-03-07T23:12:47.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1745 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 15b6cec4-eae2-4e8f-a452-add56337f94c response_code = 401 uri = /v1/disks?project=demo-project
272382025-03-07T23:12:47.717ZINFOtest_unauthorized (external client test context): client received response status = 401
272392025-03-07T23:12:47.718ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks?project=demo-project
272402025-03-07T23:12:47.718ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272412025-03-07T23:12:47.718ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96422fc5-6888-41ac-8852-d6227a99760a uri = /v1/disks?project=demo-project
272422025-03-07T23:12:47.719ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96422fc5-6888-41ac-8852-d6227a99760a uri = /v1/disks?project=demo-project
272432025-03-07T23:12:47.719ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96422fc5-6888-41ac-8852-d6227a99760a uri = /v1/disks?project=demo-project
272442025-03-07T23:12:47.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 453 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96422fc5-6888-41ac-8852-d6227a99760a response_code = 401 uri = /v1/disks?project=demo-project
272452025-03-07T23:12:47.720ZINFOtest_unauthorized (external client test context): client received response status = 401
272462025-03-07T23:12:47.720ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks?project=demo-project
272472025-03-07T23:12:47.720ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272482025-03-07T23:12:47.720ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d593e0f6-d497-42e0-b14e-8841402e4107 uri = /v1/disks?project=demo-project
272492025-03-07T23:12:47.720ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d593e0f6-d497-42e0-b14e-8841402e4107 uri = /v1/disks?project=demo-project
272502025-03-07T23:12:47.721ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1791:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1805:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d593e0f6-d497-42e0-b14e-8841402e4107 uri = /v1/disks?project=demo-project
272512025-03-07T23:12:47.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1497 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d593e0f6-d497-42e0-b14e-8841402e4107 response_code = 401 uri = /v1/disks?project=demo-project
272522025-03-07T23:12:47.721ZINFOtest_unauthorized (external client test context): client received response status = 401
272532025-03-07T23:12:47.721ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks?project=demo-project
272542025-03-07T23:12:47.721ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272552025-03-07T23:12:47.722ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3474bfd1-4fa3-4c3f-a450-d23528a9a428 uri = /v1/disks?project=demo-project
272562025-03-07T23:12:47.722ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 93 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3474bfd1-4fa3-4c3f-a450-d23528a9a428 response_code = 405 uri = /v1/disks?project=demo-project
272572025-03-07T23:12:47.722ZINFOtest_unauthorized (external client test context): client received response status = 405
272582025-03-07T23:12:47.722ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks?project=demo-project
272592025-03-07T23:12:47.722ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272602025-03-07T23:12:47.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7ef7131f-3c3a-4e82-ac1c-9dcff29e925d uri = /v1/disks?project=demo-project
272612025-03-07T23:12:47.723ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7ef7131f-3c3a-4e82-ac1c-9dcff29e925d response_code = 405 uri = /v1/disks?project=demo-project
272622025-03-07T23:12:47.723ZINFOtest_unauthorized (external client test context): client received response status = 405
272632025-03-07T23:12:47.723ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks?project=demo-project
272642025-03-07T23:12:47.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272652025-03-07T23:12:47.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 47c55a2e-2f8f-4a95-9406-34cbb8799e31 uri = /v1/disks?project=demo-project
272662025-03-07T23:12:47.723ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 47c55a2e-2f8f-4a95-9406-34cbb8799e31 response_code = 405 uri = /v1/disks?project=demo-project
272672025-03-07T23:12:47.724ZINFOtest_unauthorized (external client test context): client received response status = 405
272682025-03-07T23:12:47.724ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks?project=demo-project
272692025-03-07T23:12:47.724ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272702025-03-07T23:12:47.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0122c81-247b-4f58-80ab-ad15ac2a50c8 uri = /v1/disks?project=demo-project
272712025-03-07T23:12:47.726ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f0122c81-247b-4f58-80ab-ad15ac2a50c8 response_code = 405 uri = /v1/disks?project=demo-project
272722025-03-07T23:12:47.726ZINFOtest_unauthorized (external client test context): client received response status = 405
272732025-03-07T23:12:47.726ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks?project=demo-project
272742025-03-07T23:12:47.726ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272752025-03-07T23:12:47.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 83376557-888f-45dd-b41f-a0a37ad1cca0 uri = /v1/disks?project=demo-project
272762025-03-07T23:12:47.726ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 83376557-888f-45dd-b41f-a0a37ad1cca0 response_code = 405 uri = /v1/disks?project=demo-project
272772025-03-07T23:12:47.726ZINFOtest_unauthorized (external client test context): client received response status = 405
272782025-03-07T23:12:47.726ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks?project=demo-project
272792025-03-07T23:12:47.726ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272802025-03-07T23:12:47.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c6bab075-c18b-4e83-aadd-9b57c40d87c1 uri = /v1/disks?project=demo-project
272812025-03-07T23:12:47.726ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c6bab075-c18b-4e83-aadd-9b57c40d87c1 response_code = 405 uri = /v1/disks?project=demo-project
272822025-03-07T23:12:47.727ZINFOtest_unauthorized (external client test context): client received response status = 405
272832025-03-07T23:12:47.727ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks?project=demo-project
272842025-03-07T23:12:47.728ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272852025-03-07T23:12:47.728ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92c2f919-3dc1-4279-8133-4c2c9512d0cd uri = /v1/disks?project=demo-project
272862025-03-07T23:12:47.728ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 92c2f919-3dc1-4279-8133-4c2c9512d0cd response_code = 405 uri = /v1/disks?project=demo-project
272872025-03-07T23:12:47.728ZINFOtest_unauthorized (external client test context): client received response status = 405
272882025-03-07T23:12:47.728ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks?project=demo-project
272892025-03-07T23:12:47.728ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272902025-03-07T23:12:47.728ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7ff7a655-5d23-47e2-ba59-733e07fec84f uri = /v1/disks?project=demo-project
272912025-03-07T23:12:47.728ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7ff7a655-5d23-47e2-ba59-733e07fec84f response_code = 405 uri = /v1/disks?project=demo-project
272922025-03-07T23:12:47.728ZINFOtest_unauthorized (external client test context): client received response status = 405
272932025-03-07T23:12:47.728ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks?project=demo-project
272942025-03-07T23:12:47.728ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks?project=demo-project
272952025-03-07T23:12:47.728ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e uri = /v1/disks?project=demo-project
272962025-03-07T23:12:47.728ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e uri = /v1/disks?project=demo-project
272972025-03-07T23:12:47.728ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
272982025-03-07T23:12:47.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272992025-03-07T23:12:47.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273002025-03-07T23:12:47.729ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273012025-03-07T23:12:47.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273022025-03-07T23:12:47.732ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273032025-03-07T23:12:47.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273042025-03-07T23:12:47.734ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
273052025-03-07T23:12:47.734ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273062025-03-07T23:12:47.734ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273072025-03-07T23:12:47.735ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273082025-03-07T23:12:47.735ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273092025-03-07T23:12:47.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
273102025-03-07T23:12:47.742ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273112025-03-07T23:12:47.743ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273122025-03-07T23:12:47.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273132025-03-07T23:12:47.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273142025-03-07T23:12:47.749ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
273152025-03-07T23:12:47.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273162025-03-07T23:12:47.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273172025-03-07T23:12:47.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273182025-03-07T23:12:47.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
273192025-03-07T23:12:47.753ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273202025-03-07T23:12:47.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273212025-03-07T23:12:47.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273222025-03-07T23:12:47.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273232025-03-07T23:12:47.755ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
273242025-03-07T23:12:47.760ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273252025-03-07T23:12:47.760ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273262025-03-07T23:12:47.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273272025-03-07T23:12:47.760ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273282025-03-07T23:12:47.761ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
273292025-03-07T23:12:47.763ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e uri = /v1/disks?project=demo-project
273302025-03-07T23:12:47.764ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273312025-03-07T23:12:47.764ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273322025-03-07T23:12:47.764ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273332025-03-07T23:12:47.771ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273342025-03-07T23:12:47.771ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273352025-03-07T23:12:47.772ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273362025-03-07T23:12:47.775ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
273372025-03-07T23:12:47.776ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
273382025-03-07T23:12:47.776ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273392025-03-07T23:12:47.776ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273402025-03-07T23:12:47.777ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273412025-03-07T23:12:47.792ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
273422025-03-07T23:12:47.792ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273432025-03-07T23:12:47.792ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273442025-03-07T23:12:47.792ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273452025-03-07T23:12:47.803ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
273462025-03-07T23:12:47.803ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273472025-03-07T23:12:47.803ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273482025-03-07T23:12:47.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273492025-03-07T23:12:47.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
273502025-03-07T23:12:47.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
273512025-03-07T23:12:47.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
273522025-03-07T23:12:47.818ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks?project=demo-project
273532025-03-07T23:12:47.819ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273542025-03-07T23:12:47.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273552025-03-07T23:12:47.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273562025-03-07T23:12:47.823ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
273572025-03-07T23:12:47.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273582025-03-07T23:12:47.823ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273592025-03-07T23:12:47.824ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273602025-03-07T23:12:47.829ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
273612025-03-07T23:12:47.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273622025-03-07T23:12:47.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273632025-03-07T23:12:47.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273642025-03-07T23:12:47.846ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
273652025-03-07T23:12:47.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
273662025-03-07T23:12:47.855ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database uri = /v1/disks?project=demo-project
273672025-03-07T23:12:47.855ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
273682025-03-07T23:12:47.856ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
273692025-03-07T23:12:47.861ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 133803 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5262088b-0639-4b91-aa7f-51e6b223430e response_code = 200 uri = /v1/disks?project=demo-project
273702025-03-07T23:12:47.868ZINFOtest_unauthorized (external client test context): client received response status = 200
273712025-03-07T23:12:47.876ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-disk?project=demo-project
273722025-03-07T23:12:47.876ZINFOtest_unauthorized: test: privileged GET url = /v1/disks/demo-disk?project=demo-project
273732025-03-07T23:12:47.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
273742025-03-07T23:12:47.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c uri = /v1/disks/demo-disk?project=demo-project
273752025-03-07T23:12:47.876ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c uri = /v1/disks/demo-disk?project=demo-project
273762025-03-07T23:12:47.876ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk?project=demo-project
273772025-03-07T23:12:47.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273782025-03-07T23:12:47.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273792025-03-07T23:12:47.876ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273802025-03-07T23:12:47.880ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273812025-03-07T23:12:47.880ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273822025-03-07T23:12:47.881ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273832025-03-07T23:12:47.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
273842025-03-07T23:12:47.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273852025-03-07T23:12:47.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273862025-03-07T23:12:47.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273872025-03-07T23:12:47.885ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273882025-03-07T23:12:47.888ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
273892025-03-07T23:12:47.888ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273902025-03-07T23:12:47.888ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273912025-03-07T23:12:47.890ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273922025-03-07T23:12:47.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273932025-03-07T23:12:47.895ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
273942025-03-07T23:12:47.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273952025-03-07T23:12:47.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273962025-03-07T23:12:47.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273972025-03-07T23:12:47.908ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
273982025-03-07T23:12:47.909ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273992025-03-07T23:12:47.909ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274002025-03-07T23:12:47.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274012025-03-07T23:12:47.910ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274022025-03-07T23:12:47.913ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
274032025-03-07T23:12:47.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274042025-03-07T23:12:47.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274052025-03-07T23:12:47.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274062025-03-07T23:12:47.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
274072025-03-07T23:12:47.923ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
274082025-03-07T23:12:47.929ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c uri = /v1/disks/demo-disk?project=demo-project
274092025-03-07T23:12:47.929ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274102025-03-07T23:12:47.930ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274112025-03-07T23:12:47.930ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274122025-03-07T23:12:47.930ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274132025-03-07T23:12:47.930ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274142025-03-07T23:12:47.930ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274152025-03-07T23:12:47.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274162025-03-07T23:12:47.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274172025-03-07T23:12:47.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274182025-03-07T23:12:47.936ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
274192025-03-07T23:12:47.936ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
274202025-03-07T23:12:47.936ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274212025-03-07T23:12:47.936ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274222025-03-07T23:12:47.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274232025-03-07T23:12:47.942ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
274242025-03-07T23:12:47.942ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274252025-03-07T23:12:47.942ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274262025-03-07T23:12:47.943ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274272025-03-07T23:12:47.945ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
274282025-03-07T23:12:47.945ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database uri = /v1/disks/demo-disk?project=demo-project
274292025-03-07T23:12:47.945ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274302025-03-07T23:12:47.946ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274312025-03-07T23:12:47.949ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk?project=demo-project
274322025-03-07T23:12:47.958ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274332025-03-07T23:12:47.958ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 88982 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7743f6a7-72a6-4b94-9078-a8cfaed6613c response_code = 200 uri = /v1/disks/demo-disk?project=demo-project
274342025-03-07T23:12:47.959ZINFOtest_unauthorized (external client test context): client received response status = 200
274352025-03-07T23:12:47.959ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-disk?project=demo-project
274362025-03-07T23:12:47.959ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
274372025-03-07T23:12:47.960ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb uri = /v1/disks/demo-disk?project=demo-project
274382025-03-07T23:12:47.962ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb uri = /v1/disks/demo-disk?project=demo-project
274392025-03-07T23:12:47.962ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk?project=demo-project
274402025-03-07T23:12:47.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274412025-03-07T23:12:47.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274422025-03-07T23:12:47.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274432025-03-07T23:12:47.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274442025-03-07T23:12:47.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274452025-03-07T23:12:47.970ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274462025-03-07T23:12:47.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
274472025-03-07T23:12:47.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
274482025-03-07T23:12:47.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274492025-03-07T23:12:47.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274502025-03-07T23:12:47.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274512025-03-07T23:12:47.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
274522025-03-07T23:12:47.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274532025-03-07T23:12:47.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274542025-03-07T23:12:47.978ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274552025-03-07T23:12:47.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
274562025-03-07T23:12:47.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
274572025-03-07T23:12:47.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274582025-03-07T23:12:47.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274592025-03-07T23:12:47.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274602025-03-07T23:12:47.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
274612025-03-07T23:12:47.988ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
274622025-03-07T23:12:47.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274632025-03-07T23:12:47.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274642025-03-07T23:12:47.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274652025-03-07T23:12:47.996ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
274662025-03-07T23:12:47.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274672025-03-07T23:12:47.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274682025-03-07T23:12:47.998ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274692025-03-07T23:12:48.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
274702025-03-07T23:12:48.011ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
274712025-03-07T23:12:48.012ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb uri = /v1/disks/demo-disk?project=demo-project
274722025-03-07T23:12:48.012ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274732025-03-07T23:12:48.012ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274742025-03-07T23:12:48.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274752025-03-07T23:12:48.016ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274762025-03-07T23:12:48.016ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274772025-03-07T23:12:48.018ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274782025-03-07T23:12:48.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274792025-03-07T23:12:48.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274802025-03-07T23:12:48.026ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274812025-03-07T23:12:48.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
274822025-03-07T23:12:48.029ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
274832025-03-07T23:12:48.030ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274842025-03-07T23:12:48.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274852025-03-07T23:12:48.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274862025-03-07T23:12:48.033ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
274872025-03-07T23:12:48.033ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274882025-03-07T23:12:48.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274892025-03-07T23:12:48.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274902025-03-07T23:12:48.039ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
274912025-03-07T23:12:48.039ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database uri = /v1/disks/demo-disk?project=demo-project
274922025-03-07T23:12:48.039ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274932025-03-07T23:12:48.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
274942025-03-07T23:12:48.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
274952025-03-07T23:12:48.056ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk?project=demo-project
274962025-03-07T23:12:48.057ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 94819 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c35a662d-82cf-447e-9254-19f8130ef7bb response_code = 404 uri = /v1/disks/demo-disk?project=demo-project
274972025-03-07T23:12:48.057ZINFOtest_unauthorized (external client test context): client received response status = 404
274982025-03-07T23:12:48.057ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-disk?project=demo-project
274992025-03-07T23:12:48.057ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275002025-03-07T23:12:48.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 499c1dc9-9b99-4612-824f-e35df05d14c7 uri = /v1/disks/demo-disk?project=demo-project
275012025-03-07T23:12:48.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 499c1dc9-9b99-4612-824f-e35df05d14c7 uri = /v1/disks/demo-disk?project=demo-project
275022025-03-07T23:12:48.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 499c1dc9-9b99-4612-824f-e35df05d14c7 uri = /v1/disks/demo-disk?project=demo-project
275032025-03-07T23:12:48.058ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 499c1dc9-9b99-4612-824f-e35df05d14c7 uri = /v1/disks/demo-disk?project=demo-project
275042025-03-07T23:12:48.058ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 369 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 499c1dc9-9b99-4612-824f-e35df05d14c7 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
275052025-03-07T23:12:48.058ZINFOtest_unauthorized (external client test context): client received response status = 401
275062025-03-07T23:12:48.059ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-disk?project=demo-project
275072025-03-07T23:12:48.059ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275082025-03-07T23:12:48.059ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = babfb157-c8cc-4af1-88e5-0b4fef5135a9 uri = /v1/disks/demo-disk?project=demo-project
275092025-03-07T23:12:48.059ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = babfb157-c8cc-4af1-88e5-0b4fef5135a9 uri = /v1/disks/demo-disk?project=demo-project
275102025-03-07T23:12:48.059ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = babfb157-c8cc-4af1-88e5-0b4fef5135a9 uri = /v1/disks/demo-disk?project=demo-project
275112025-03-07T23:12:48.059ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 210 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = babfb157-c8cc-4af1-88e5-0b4fef5135a9 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
275122025-03-07T23:12:48.059ZINFOtest_unauthorized (external client test context): client received response status = 401
275132025-03-07T23:12:48.059ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-disk?project=demo-project
275142025-03-07T23:12:48.061ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275152025-03-07T23:12:48.061ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4a7a7c1-bbbc-433f-a098-e39f5f2bec56 uri = /v1/disks/demo-disk?project=demo-project
275162025-03-07T23:12:48.061ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4a7a7c1-bbbc-433f-a098-e39f5f2bec56 uri = /v1/disks/demo-disk?project=demo-project
275172025-03-07T23:12:48.062ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1816:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1832:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4a7a7c1-bbbc-433f-a098-e39f5f2bec56 uri = /v1/disks/demo-disk?project=demo-project
275182025-03-07T23:12:48.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 978 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4a7a7c1-bbbc-433f-a098-e39f5f2bec56 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
275192025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client received response status = 401
275202025-03-07T23:12:48.062ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-disk?project=demo-project
275212025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275222025-03-07T23:12:48.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2091ceb2-ee41-4692-93f9-30bf75e755d7 uri = /v1/disks/demo-disk?project=demo-project
275232025-03-07T23:12:48.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2091ceb2-ee41-4692-93f9-30bf75e755d7 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275242025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client received response status = 405
275252025-03-07T23:12:48.062ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-disk?project=demo-project
275262025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275272025-03-07T23:12:48.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f2134fa5-1770-4980-b324-847e24b6fdc0 uri = /v1/disks/demo-disk?project=demo-project
275282025-03-07T23:12:48.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f2134fa5-1770-4980-b324-847e24b6fdc0 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275292025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client received response status = 405
275302025-03-07T23:12:48.062ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-disk?project=demo-project
275312025-03-07T23:12:48.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275322025-03-07T23:12:48.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 291799dd-250c-44b0-8155-38680e310996 uri = /v1/disks/demo-disk?project=demo-project
275332025-03-07T23:12:48.063ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 291799dd-250c-44b0-8155-38680e310996 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275342025-03-07T23:12:48.063ZINFOtest_unauthorized (external client test context): client received response status = 405
275352025-03-07T23:12:48.063ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-disk?project=demo-project
275362025-03-07T23:12:48.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275372025-03-07T23:12:48.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b19aa64-3989-4388-9002-c4f0e8e5a4eb uri = /v1/disks/demo-disk?project=demo-project
275382025-03-07T23:12:48.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b19aa64-3989-4388-9002-c4f0e8e5a4eb response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275392025-03-07T23:12:48.064ZINFOtest_unauthorized (external client test context): client received response status = 405
275402025-03-07T23:12:48.064ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-disk?project=demo-project
275412025-03-07T23:12:48.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275422025-03-07T23:12:48.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b603d98f-935c-4777-a171-b2b2b66da743 uri = /v1/disks/demo-disk?project=demo-project
275432025-03-07T23:12:48.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 93 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b603d98f-935c-4777-a171-b2b2b66da743 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275442025-03-07T23:12:48.064ZINFOtest_unauthorized (external client test context): client received response status = 405
275452025-03-07T23:12:48.064ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-disk?project=demo-project
275462025-03-07T23:12:48.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275472025-03-07T23:12:48.065ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d7a318ed-426f-4f68-bf37-6952b271d959 uri = /v1/disks/demo-disk?project=demo-project
275482025-03-07T23:12:48.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d7a318ed-426f-4f68-bf37-6952b271d959 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275492025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client received response status = 405
275502025-03-07T23:12:48.066ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-disk?project=demo-project
275512025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275522025-03-07T23:12:48.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61c20b24-aff1-4c6e-bb61-f147918e0f0c uri = /v1/disks/demo-disk?project=demo-project
275532025-03-07T23:12:48.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61c20b24-aff1-4c6e-bb61-f147918e0f0c response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275542025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client received response status = 405
275552025-03-07T23:12:48.066ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-disk?project=demo-project
275562025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275572025-03-07T23:12:48.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59eb3fd9-6c07-4b9a-905d-4c3a1fa80014 uri = /v1/disks/demo-disk?project=demo-project
275582025-03-07T23:12:48.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59eb3fd9-6c07-4b9a-905d-4c3a1fa80014 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
275592025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client received response status = 405
275602025-03-07T23:12:48.066ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-disk?project=demo-project
275612025-03-07T23:12:48.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
275622025-03-07T23:12:48.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 uri = /v1/disks/demo-disk?project=demo-project
275632025-03-07T23:12:48.066ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 uri = /v1/disks/demo-disk?project=demo-project
275642025-03-07T23:12:48.067ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk?project=demo-project
275652025-03-07T23:12:48.069ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275662025-03-07T23:12:48.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275672025-03-07T23:12:48.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275682025-03-07T23:12:48.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275692025-03-07T23:12:48.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275702025-03-07T23:12:48.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275712025-03-07T23:12:48.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
275722025-03-07T23:12:48.070ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
275732025-03-07T23:12:48.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275742025-03-07T23:12:48.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275752025-03-07T23:12:48.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275762025-03-07T23:12:48.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
275772025-03-07T23:12:48.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275782025-03-07T23:12:48.081ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275792025-03-07T23:12:48.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275802025-03-07T23:12:48.092ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
275812025-03-07T23:12:48.096ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
275822025-03-07T23:12:48.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275832025-03-07T23:12:48.097ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275842025-03-07T23:12:48.115ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275852025-03-07T23:12:48.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
275862025-03-07T23:12:48.120ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
275872025-03-07T23:12:48.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275882025-03-07T23:12:48.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275892025-03-07T23:12:48.121ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275902025-03-07T23:12:48.126ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
275912025-03-07T23:12:48.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275922025-03-07T23:12:48.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275932025-03-07T23:12:48.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275942025-03-07T23:12:48.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
275952025-03-07T23:12:48.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
275962025-03-07T23:12:48.133ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 uri = /v1/disks/demo-disk?project=demo-project
275972025-03-07T23:12:48.133ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
275982025-03-07T23:12:48.138ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
275992025-03-07T23:12:48.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276002025-03-07T23:12:48.138ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
276012025-03-07T23:12:48.138ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276022025-03-07T23:12:48.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276032025-03-07T23:12:48.138ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
276042025-03-07T23:12:48.139ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276052025-03-07T23:12:48.140ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276062025-03-07T23:12:48.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
276072025-03-07T23:12:48.142ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
276082025-03-07T23:12:48.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
276092025-03-07T23:12:48.142ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276102025-03-07T23:12:48.143ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276112025-03-07T23:12:48.145ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
276122025-03-07T23:12:48.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
276132025-03-07T23:12:48.146ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276142025-03-07T23:12:48.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276152025-03-07T23:12:48.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
276162025-03-07T23:12:48.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database uri = /v1/disks/demo-disk?project=demo-project
276172025-03-07T23:12:48.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276182025-03-07T23:12:48.150ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
276192025-03-07T23:12:48.152ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
276202025-03-07T23:12:48.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk?project=demo-project
276212025-03-07T23:12:48.176ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 112330 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c15d769b-f3f2-47a9-96ea-49245c85c328 response_code = 404 uri = /v1/disks/demo-disk?project=demo-project
276222025-03-07T23:12:48.176ZINFOtest_unauthorized (external client test context): client received response status = 404
276232025-03-07T23:12:48.177ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-disk?project=demo-project
276242025-03-07T23:12:48.177ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276252025-03-07T23:12:48.177ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e342ede7-8983-407c-a070-a1ddac90e1d9 uri = /v1/disks/demo-disk?project=demo-project
276262025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e342ede7-8983-407c-a070-a1ddac90e1d9 uri = /v1/disks/demo-disk?project=demo-project
276272025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e342ede7-8983-407c-a070-a1ddac90e1d9 uri = /v1/disks/demo-disk?project=demo-project
276282025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e342ede7-8983-407c-a070-a1ddac90e1d9 uri = /v1/disks/demo-disk?project=demo-project
276292025-03-07T23:12:48.178ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 369 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e342ede7-8983-407c-a070-a1ddac90e1d9 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
276302025-03-07T23:12:48.178ZINFOtest_unauthorized (external client test context): client received response status = 401
276312025-03-07T23:12:48.178ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-disk?project=demo-project
276322025-03-07T23:12:48.178ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276332025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f386788-9c2c-4727-8f85-0f76d0de6e89 uri = /v1/disks/demo-disk?project=demo-project
276342025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f386788-9c2c-4727-8f85-0f76d0de6e89 uri = /v1/disks/demo-disk?project=demo-project
276352025-03-07T23:12:48.178ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f386788-9c2c-4727-8f85-0f76d0de6e89 uri = /v1/disks/demo-disk?project=demo-project
276362025-03-07T23:12:48.178ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 231 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3f386788-9c2c-4727-8f85-0f76d0de6e89 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
276372025-03-07T23:12:48.178ZINFOtest_unauthorized (external client test context): client received response status = 401
276382025-03-07T23:12:48.178ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-disk?project=demo-project
276392025-03-07T23:12:48.178ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276402025-03-07T23:12:48.179ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 215b5c8e-d6f8-437f-b54b-1ad97c402556 uri = /v1/disks/demo-disk?project=demo-project
276412025-03-07T23:12:48.179ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 215b5c8e-d6f8-437f-b54b-1ad97c402556 uri = /v1/disks/demo-disk?project=demo-project
276422025-03-07T23:12:48.181ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1843:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1859:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 215b5c8e-d6f8-437f-b54b-1ad97c402556 uri = /v1/disks/demo-disk?project=demo-project
276432025-03-07T23:12:48.181ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1014 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 215b5c8e-d6f8-437f-b54b-1ad97c402556 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
276442025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client received response status = 401
276452025-03-07T23:12:48.181ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-disk?project=demo-project
276462025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276472025-03-07T23:12:48.181ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 378df98f-5906-4838-a6c5-7bc60dcd2eec uri = /v1/disks/demo-disk?project=demo-project
276482025-03-07T23:12:48.181ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 378df98f-5906-4838-a6c5-7bc60dcd2eec response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
276492025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client received response status = 405
276502025-03-07T23:12:48.181ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-disk?project=demo-project
276512025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276522025-03-07T23:12:48.181ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 05117dc8-7b34-46b4-9159-976618a26ca4 uri = /v1/disks/demo-disk?project=demo-project
276532025-03-07T23:12:48.181ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 05117dc8-7b34-46b4-9159-976618a26ca4 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
276542025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client received response status = 405
276552025-03-07T23:12:48.181ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-disk?project=demo-project
276562025-03-07T23:12:48.181ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276572025-03-07T23:12:48.182ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41dd98e6-aa80-417d-b13a-7febc0b6095f uri = /v1/disks/demo-disk?project=demo-project
276582025-03-07T23:12:48.182ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41dd98e6-aa80-417d-b13a-7febc0b6095f response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
276592025-03-07T23:12:48.182ZINFOtest_unauthorized (external client test context): client received response status = 405
276602025-03-07T23:12:48.182ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-disk?project=demo-project
276612025-03-07T23:12:48.183ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276622025-03-07T23:12:48.184ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4b910921-4832-4514-981a-ec027d330e86 uri = /v1/disks/demo-disk?project=demo-project
276632025-03-07T23:12:48.184ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4b910921-4832-4514-981a-ec027d330e86 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
276642025-03-07T23:12:48.184ZINFOtest_unauthorized (external client test context): client received response status = 405
276652025-03-07T23:12:48.184ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-disk?project=demo-project
276662025-03-07T23:12:48.184ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk?project=demo-project
276672025-03-07T23:12:48.184ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece uri = /v1/disks/demo-disk?project=demo-project
276682025-03-07T23:12:48.184ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece uri = /v1/disks/demo-disk?project=demo-project
276692025-03-07T23:12:48.184ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk?project=demo-project
276702025-03-07T23:12:48.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276712025-03-07T23:12:48.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276722025-03-07T23:12:48.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276732025-03-07T23:12:48.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276742025-03-07T23:12:48.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276752025-03-07T23:12:48.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276762025-03-07T23:12:48.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
276772025-03-07T23:12:48.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
276782025-03-07T23:12:48.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276792025-03-07T23:12:48.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276802025-03-07T23:12:48.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276812025-03-07T23:12:48.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
276822025-03-07T23:12:48.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276832025-03-07T23:12:48.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276842025-03-07T23:12:48.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276852025-03-07T23:12:48.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
276862025-03-07T23:12:48.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
276872025-03-07T23:12:48.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276882025-03-07T23:12:48.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276892025-03-07T23:12:48.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276902025-03-07T23:12:48.205ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
276912025-03-07T23:12:48.205ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
276922025-03-07T23:12:48.205ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276932025-03-07T23:12:48.205ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276942025-03-07T23:12:48.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276952025-03-07T23:12:48.208ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
276962025-03-07T23:12:48.210ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276972025-03-07T23:12:48.210ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276982025-03-07T23:12:48.210ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276992025-03-07T23:12:48.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
277002025-03-07T23:12:48.222ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
277012025-03-07T23:12:48.227ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece uri = /v1/disks/demo-disk?project=demo-project
277022025-03-07T23:12:48.227ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277032025-03-07T23:12:48.227ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277042025-03-07T23:12:48.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277052025-03-07T23:12:48.227ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
277062025-03-07T23:12:48.227ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
277072025-03-07T23:12:48.227ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
277082025-03-07T23:12:48.227ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
277092025-03-07T23:12:48.227ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277102025-03-07T23:12:48.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277112025-03-07T23:12:48.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277122025-03-07T23:12:48.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277132025-03-07T23:12:48.232ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277142025-03-07T23:12:48.233ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277152025-03-07T23:12:48.235ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
277162025-03-07T23:12:48.235ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
277172025-03-07T23:12:48.236ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
277182025-03-07T23:12:48.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
277192025-03-07T23:12:48.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277202025-03-07T23:12:48.237ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277212025-03-07T23:12:48.237ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277222025-03-07T23:12:48.258ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
277232025-03-07T23:12:48.258ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
277242025-03-07T23:12:48.260ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
277252025-03-07T23:12:48.260ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277262025-03-07T23:12:48.260ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277272025-03-07T23:12:48.261ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277282025-03-07T23:12:48.266ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
277292025-03-07T23:12:48.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database uri = /v1/disks/demo-disk?project=demo-project
277302025-03-07T23:12:48.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
277312025-03-07T23:12:48.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277322025-03-07T23:12:48.270ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk?project=demo-project
277332025-03-07T23:12:48.278ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
277342025-03-07T23:12:48.279ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 96317 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b875d920-51b3-40bd-8f11-3f1e42c19ece response_code = 200 uri = /v1/disks/demo-disk?project=demo-project
277352025-03-07T23:12:48.280ZINFOtest_unauthorized (external client test context): client received response status = 200
277362025-03-07T23:12:48.281ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277372025-03-07T23:12:48.281ZINFOtest_unauthorized: test: privileged GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277382025-03-07T23:12:48.281ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277392025-03-07T23:12:48.281ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277402025-03-07T23:12:48.282ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277412025-03-07T23:12:48.283ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277422025-03-07T23:12:48.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277432025-03-07T23:12:48.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277442025-03-07T23:12:48.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277452025-03-07T23:12:48.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277462025-03-07T23:12:48.291ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277472025-03-07T23:12:48.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277482025-03-07T23:12:48.297ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
277492025-03-07T23:12:48.297ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
277502025-03-07T23:12:48.297ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277512025-03-07T23:12:48.297ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277522025-03-07T23:12:48.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277532025-03-07T23:12:48.314ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
277542025-03-07T23:12:48.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277552025-03-07T23:12:48.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277562025-03-07T23:12:48.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277572025-03-07T23:12:48.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
277582025-03-07T23:12:48.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
277592025-03-07T23:12:48.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277602025-03-07T23:12:48.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277612025-03-07T23:12:48.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277622025-03-07T23:12:48.337ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
277632025-03-07T23:12:48.338ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
277642025-03-07T23:12:48.338ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
277652025-03-07T23:12:48.338ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
277662025-03-07T23:12:48.339ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
277672025-03-07T23:12:48.339ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
277682025-03-07T23:12:48.339ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
277692025-03-07T23:12:48.339ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
277702025-03-07T23:12:48.340ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
277712025-03-07T23:12:48.340ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
277722025-03-07T23:12:48.340ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
277732025-03-07T23:12:48.340ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
277742025-03-07T23:12:48.341ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277752025-03-07T23:12:48.341ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277762025-03-07T23:12:48.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277772025-03-07T23:12:48.345ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
277782025-03-07T23:12:48.346ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277792025-03-07T23:12:48.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277802025-03-07T23:12:48.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277812025-03-07T23:12:48.349ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
277822025-03-07T23:12:48.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
277832025-03-07T23:12:48.361ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277842025-03-07T23:12:48.361ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277852025-03-07T23:12:48.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277862025-03-07T23:12:48.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277872025-03-07T23:12:48.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277882025-03-07T23:12:48.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277892025-03-07T23:12:48.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277902025-03-07T23:12:48.367ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277912025-03-07T23:12:48.367ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277922025-03-07T23:12:48.369ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277932025-03-07T23:12:48.370ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277942025-03-07T23:12:48.371ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277952025-03-07T23:12:48.371ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277962025-03-07T23:12:48.371ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277972025-03-07T23:12:48.372ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277982025-03-07T23:12:48.378ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
277992025-03-07T23:12:48.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278002025-03-07T23:12:48.380ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278012025-03-07T23:12:48.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278022025-03-07T23:12:48.382ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278032025-03-07T23:12:48.382ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278042025-03-07T23:12:48.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278052025-03-07T23:12:48.383ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278062025-03-07T23:12:48.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278072025-03-07T23:12:48.394ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278082025-03-07T23:12:48.395ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7
278092025-03-07T23:12:48.396ZTRACtest_unauthorized (clickhouse-client): executing SQL query id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
278102025-03-07T23:12:48.432ZTRACtest_unauthorized (clickhouse-client): retrieved new timeseries schema id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7 n_schema = 6
278112025-03-07T23:12:48.437ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 155210 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9e4dece1-2585-48f9-891c-d55dc802e394 response_code = 200 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278122025-03-07T23:12:48.438ZINFOtest_unauthorized (external client test context): client received response status = 200
278132025-03-07T23:12:48.438ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278142025-03-07T23:12:48.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278152025-03-07T23:12:48.440ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278162025-03-07T23:12:48.442ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278172025-03-07T23:12:48.442ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278182025-03-07T23:12:48.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278192025-03-07T23:12:48.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278202025-03-07T23:12:48.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278212025-03-07T23:12:48.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278222025-03-07T23:12:48.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278232025-03-07T23:12:48.452ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278242025-03-07T23:12:48.457ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
278252025-03-07T23:12:48.457ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
278262025-03-07T23:12:48.457ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278272025-03-07T23:12:48.457ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278282025-03-07T23:12:48.457ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278292025-03-07T23:12:48.459ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
278302025-03-07T23:12:48.460ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278312025-03-07T23:12:48.460ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278322025-03-07T23:12:48.461ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278332025-03-07T23:12:48.464ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
278342025-03-07T23:12:48.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
278352025-03-07T23:12:48.468ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278362025-03-07T23:12:48.468ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278372025-03-07T23:12:48.469ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278382025-03-07T23:12:48.472ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
278392025-03-07T23:12:48.472ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
278402025-03-07T23:12:48.472ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278412025-03-07T23:12:48.472ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278422025-03-07T23:12:48.473ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278432025-03-07T23:12:48.476ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
278442025-03-07T23:12:48.476ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278452025-03-07T23:12:48.476ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278462025-03-07T23:12:48.476ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278472025-03-07T23:12:48.478ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
278482025-03-07T23:12:48.482ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
278492025-03-07T23:12:48.483ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278502025-03-07T23:12:48.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278512025-03-07T23:12:48.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278522025-03-07T23:12:48.484ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278532025-03-07T23:12:48.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278542025-03-07T23:12:48.489ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278552025-03-07T23:12:48.489ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278562025-03-07T23:12:48.491ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278572025-03-07T23:12:48.491ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278582025-03-07T23:12:48.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278592025-03-07T23:12:48.497ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278602025-03-07T23:12:48.497ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278612025-03-07T23:12:48.498ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278622025-03-07T23:12:48.498ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278632025-03-07T23:12:48.498ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278642025-03-07T23:12:48.509ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278652025-03-07T23:12:48.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278662025-03-07T23:12:48.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278672025-03-07T23:12:48.510ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278682025-03-07T23:12:48.517ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278692025-03-07T23:12:48.518ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278702025-03-07T23:12:48.518ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278712025-03-07T23:12:48.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278722025-03-07T23:12:48.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278732025-03-07T23:12:48.537ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278742025-03-07T23:12:48.538ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 99338 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398a4ddc-3e68-4b4e-b92d-1834da308d17 response_code = 404 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278752025-03-07T23:12:48.539ZINFOtest_unauthorized (external client test context): client received response status = 404
278762025-03-07T23:12:48.542ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278772025-03-07T23:12:48.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278782025-03-07T23:12:48.543ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b6683df-6106-4fd4-a504-822ec70c557e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278792025-03-07T23:12:48.543ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b6683df-6106-4fd4-a504-822ec70c557e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278802025-03-07T23:12:48.543ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b6683df-6106-4fd4-a504-822ec70c557e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278812025-03-07T23:12:48.543ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b6683df-6106-4fd4-a504-822ec70c557e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278822025-03-07T23:12:48.545ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1097 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b6683df-6106-4fd4-a504-822ec70c557e response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278832025-03-07T23:12:48.545ZINFOtest_unauthorized (external client test context): client received response status = 401
278842025-03-07T23:12:48.545ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278852025-03-07T23:12:48.545ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278862025-03-07T23:12:48.545ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 080cf165-828b-4f93-b96e-dc8627d6d2f1 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278872025-03-07T23:12:48.545ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 080cf165-828b-4f93-b96e-dc8627d6d2f1 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278882025-03-07T23:12:48.545ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 080cf165-828b-4f93-b96e-dc8627d6d2f1 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278892025-03-07T23:12:48.545ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 249 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 080cf165-828b-4f93-b96e-dc8627d6d2f1 response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278902025-03-07T23:12:48.545ZINFOtest_unauthorized (external client test context): client received response status = 401
278912025-03-07T23:12:48.547ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278922025-03-07T23:12:48.547ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278932025-03-07T23:12:48.547ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 327d737e-785c-4508-8dee-23527480cbd5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278942025-03-07T23:12:48.547ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 327d737e-785c-4508-8dee-23527480cbd5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278952025-03-07T23:12:48.547ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1884:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1905:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 327d737e-785c-4508-8dee-23527480cbd5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278962025-03-07T23:12:48.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1006 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 327d737e-785c-4508-8dee-23527480cbd5 response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278972025-03-07T23:12:48.548ZINFOtest_unauthorized (external client test context): client received response status = 401
278982025-03-07T23:12:48.548ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
278992025-03-07T23:12:48.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279002025-03-07T23:12:48.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a364f161-7e14-4191-a5e8-1268b8b9e495 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279012025-03-07T23:12:48.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a364f161-7e14-4191-a5e8-1268b8b9e495 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279022025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client received response status = 405
279032025-03-07T23:12:48.549ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279042025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279052025-03-07T23:12:48.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e30f343f-514a-4d0e-9a5c-5535ea617ba9 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279062025-03-07T23:12:48.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e30f343f-514a-4d0e-9a5c-5535ea617ba9 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279072025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client received response status = 405
279082025-03-07T23:12:48.549ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279092025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279102025-03-07T23:12:48.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 101c1bba-0714-495e-a436-875155f5a247 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279112025-03-07T23:12:48.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 101c1bba-0714-495e-a436-875155f5a247 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279122025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client received response status = 405
279132025-03-07T23:12:48.549ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279142025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279152025-03-07T23:12:48.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c55e8002-2720-46fb-b612-a6c8d18a834e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279162025-03-07T23:12:48.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 259 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c55e8002-2720-46fb-b612-a6c8d18a834e response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279172025-03-07T23:12:48.549ZINFOtest_unauthorized (external client test context): client received response status = 405
279182025-03-07T23:12:48.549ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279192025-03-07T23:12:48.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279202025-03-07T23:12:48.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cfe9a784-ef9d-4abb-9e23-00415cb43966 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279212025-03-07T23:12:48.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 183 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cfe9a784-ef9d-4abb-9e23-00415cb43966 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279222025-03-07T23:12:48.550ZINFOtest_unauthorized (external client test context): client received response status = 405
279232025-03-07T23:12:48.551ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279242025-03-07T23:12:48.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279252025-03-07T23:12:48.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae28a01-4989-4ea9-b253-5b0a568b03da uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279262025-03-07T23:12:48.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7ae28a01-4989-4ea9-b253-5b0a568b03da response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279272025-03-07T23:12:48.552ZINFOtest_unauthorized (external client test context): client received response status = 405
279282025-03-07T23:12:48.552ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279292025-03-07T23:12:48.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279302025-03-07T23:12:48.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 743c156e-43a5-46af-9168-e3f91de823d3 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279312025-03-07T23:12:48.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 743c156e-43a5-46af-9168-e3f91de823d3 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279322025-03-07T23:12:48.553ZINFOtest_unauthorized (external client test context): client received response status = 405
279332025-03-07T23:12:48.553ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279342025-03-07T23:12:48.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279352025-03-07T23:12:48.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72436389-e94a-463e-8bed-b144cd855a27 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279362025-03-07T23:12:48.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 72436389-e94a-463e-8bed-b144cd855a27 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279372025-03-07T23:12:48.554ZINFOtest_unauthorized (external client test context): client received response status = 405
279382025-03-07T23:12:48.554ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279392025-03-07T23:12:48.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279402025-03-07T23:12:48.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 162bae62-4671-4ee7-a423-74fee2eca347 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279412025-03-07T23:12:48.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 162bae62-4671-4ee7-a423-74fee2eca347 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279422025-03-07T23:12:48.554ZINFOtest_unauthorized (external client test context): client received response status = 405
279432025-03-07T23:12:48.555ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279442025-03-07T23:12:48.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279452025-03-07T23:12:48.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 354283ec-77e9-49f5-8195-8aa7d75a6b6a uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279462025-03-07T23:12:48.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 629 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 354283ec-77e9-49f5-8195-8aa7d75a6b6a response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279472025-03-07T23:12:48.555ZINFOtest_unauthorized (external client test context): client received response status = 405
279482025-03-07T23:12:48.556ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279492025-03-07T23:12:48.556ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279502025-03-07T23:12:48.556ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 13c42359-c655-4eeb-9729-764c090799a7 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279512025-03-07T23:12:48.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 13c42359-c655-4eeb-9729-764c090799a7 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279522025-03-07T23:12:48.557ZINFOtest_unauthorized (external client test context): client received response status = 405
279532025-03-07T23:12:48.557ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279542025-03-07T23:12:48.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279552025-03-07T23:12:48.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b7c3e45-fa5e-4c29-b690-aeb1e6d30249 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279562025-03-07T23:12:48.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9b7c3e45-fa5e-4c29-b690-aeb1e6d30249 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279572025-03-07T23:12:48.557ZINFOtest_unauthorized (external client test context): client received response status = 405
279582025-03-07T23:12:48.557ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279592025-03-07T23:12:48.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279602025-03-07T23:12:48.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1460a464-0eef-4776-911c-e9220b6c8852 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279612025-03-07T23:12:48.558ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 521 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1460a464-0eef-4776-911c-e9220b6c8852 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279622025-03-07T23:12:48.558ZINFOtest_unauthorized (external client test context): client received response status = 405
279632025-03-07T23:12:48.558ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279642025-03-07T23:12:48.559ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279652025-03-07T23:12:48.559ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f2f91d6c-7e92-47ff-a09c-22e54bc1f5ae uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279662025-03-07T23:12:48.559ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f2f91d6c-7e92-47ff-a09c-22e54bc1f5ae response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279672025-03-07T23:12:48.559ZINFOtest_unauthorized (external client test context): client received response status = 405
279682025-03-07T23:12:48.559ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279692025-03-07T23:12:48.559ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279702025-03-07T23:12:48.559ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6d6a7e8e-6658-4a87-ad23-84500fbee987 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279712025-03-07T23:12:48.560ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6d6a7e8e-6658-4a87-ad23-84500fbee987 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279722025-03-07T23:12:48.560ZINFOtest_unauthorized (external client test context): client received response status = 405
279732025-03-07T23:12:48.560ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279742025-03-07T23:12:48.560ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279752025-03-07T23:12:48.560ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = afb88ec5-096b-44e2-81a3-74b03343a2cf uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279762025-03-07T23:12:48.560ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = afb88ec5-096b-44e2-81a3-74b03343a2cf response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279772025-03-07T23:12:48.560ZINFOtest_unauthorized (external client test context): client received response status = 405
279782025-03-07T23:12:48.560ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279792025-03-07T23:12:48.561ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279802025-03-07T23:12:48.561ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279812025-03-07T23:12:48.561ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279822025-03-07T23:12:48.561ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
279832025-03-07T23:12:48.561ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279842025-03-07T23:12:48.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279852025-03-07T23:12:48.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279862025-03-07T23:12:48.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279872025-03-07T23:12:48.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279882025-03-07T23:12:48.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279892025-03-07T23:12:48.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
279902025-03-07T23:12:48.567ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
279912025-03-07T23:12:48.567ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279922025-03-07T23:12:48.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279932025-03-07T23:12:48.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279942025-03-07T23:12:48.571ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
279952025-03-07T23:12:48.574ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279962025-03-07T23:12:48.574ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279972025-03-07T23:12:48.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279982025-03-07T23:12:48.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
279992025-03-07T23:12:48.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
280002025-03-07T23:12:48.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280012025-03-07T23:12:48.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280022025-03-07T23:12:48.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280032025-03-07T23:12:48.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280042025-03-07T23:12:48.587ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280052025-03-07T23:12:48.590ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
280062025-03-07T23:12:48.591ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
280072025-03-07T23:12:48.591ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280082025-03-07T23:12:48.591ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280092025-03-07T23:12:48.592ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280102025-03-07T23:12:48.593ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280112025-03-07T23:12:48.594ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280122025-03-07T23:12:48.595ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280132025-03-07T23:12:48.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
280142025-03-07T23:12:48.596ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
280152025-03-07T23:12:48.596ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280162025-03-07T23:12:48.597ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280172025-03-07T23:12:48.598ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280182025-03-07T23:12:48.602ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
280192025-03-07T23:12:48.605ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
280202025-03-07T23:12:48.607ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280212025-03-07T23:12:48.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280222025-03-07T23:12:48.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280232025-03-07T23:12:48.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280242025-03-07T23:12:48.609ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280252025-03-07T23:12:48.609ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280262025-03-07T23:12:48.610ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280272025-03-07T23:12:48.624ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280282025-03-07T23:12:48.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280292025-03-07T23:12:48.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280302025-03-07T23:12:48.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280312025-03-07T23:12:48.631ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280322025-03-07T23:12:48.631ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280332025-03-07T23:12:48.631ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280342025-03-07T23:12:48.632ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280352025-03-07T23:12:48.637ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280362025-03-07T23:12:48.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280372025-03-07T23:12:48.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280382025-03-07T23:12:48.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280392025-03-07T23:12:48.641ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280402025-03-07T23:12:48.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280412025-03-07T23:12:48.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280422025-03-07T23:12:48.643ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280432025-03-07T23:12:48.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280442025-03-07T23:12:48.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 0c4001f0-f776-4e82-98bc-918ec9d357f4, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280452025-03-07T23:12:48.663ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7
280462025-03-07T23:12:48.663ZTRACtest_unauthorized (clickhouse-client): executing SQL query id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric', 'virtual_machine:check') FORMAT Native;
280472025-03-07T23:12:48.670ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database id = 1de4a4a4-6836-4efa-96cf-ee6671b2d3f7
280482025-03-07T23:12:48.673ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 112892 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 31b21f75-eb7c-49de-9ead-687631d82e62 response_code = 200 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:12:28.955530018Z&end_time=2025-03-07T23:12:28.955531468Z&project=demo-project
280492025-03-07T23:12:48.673ZINFOtest_unauthorized (external client test context): client received response status = 200
280502025-03-07T23:12:48.674ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks?project=demo-project
280512025-03-07T23:12:48.674ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/disks?project=demo-project
280522025-03-07T23:12:48.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
280532025-03-07T23:12:48.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 uri = /v1/instances/demo-instance/disks?project=demo-project
280542025-03-07T23:12:48.675ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 uri = /v1/instances/demo-instance/disks?project=demo-project
280552025-03-07T23:12:48.675ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/disks?project=demo-project
280562025-03-07T23:12:48.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280572025-03-07T23:12:48.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280582025-03-07T23:12:48.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280592025-03-07T23:12:48.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280602025-03-07T23:12:48.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280612025-03-07T23:12:48.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280622025-03-07T23:12:48.686ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
280632025-03-07T23:12:48.686ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
280642025-03-07T23:12:48.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280652025-03-07T23:12:48.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280662025-03-07T23:12:48.691ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280672025-03-07T23:12:48.694ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
280682025-03-07T23:12:48.696ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280692025-03-07T23:12:48.696ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280702025-03-07T23:12:48.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280712025-03-07T23:12:48.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
280722025-03-07T23:12:48.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
280732025-03-07T23:12:48.702ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280742025-03-07T23:12:48.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280752025-03-07T23:12:48.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280762025-03-07T23:12:48.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
280772025-03-07T23:12:48.705ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
280782025-03-07T23:12:48.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280792025-03-07T23:12:48.706ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280802025-03-07T23:12:48.707ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280812025-03-07T23:12:48.711ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
280822025-03-07T23:12:48.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280832025-03-07T23:12:48.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280842025-03-07T23:12:48.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280852025-03-07T23:12:48.718ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
280862025-03-07T23:12:48.722ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
280872025-03-07T23:12:48.722ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 uri = /v1/instances/demo-instance/disks?project=demo-project
280882025-03-07T23:12:48.722ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
280892025-03-07T23:12:48.722ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
280902025-03-07T23:12:48.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
280912025-03-07T23:12:48.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
280922025-03-07T23:12:48.725ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
280932025-03-07T23:12:48.727ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
280942025-03-07T23:12:48.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
280952025-03-07T23:12:48.733ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
280962025-03-07T23:12:48.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
280972025-03-07T23:12:48.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
280982025-03-07T23:12:48.736ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
280992025-03-07T23:12:48.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281002025-03-07T23:12:48.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281012025-03-07T23:12:48.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281022025-03-07T23:12:48.744ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
281032025-03-07T23:12:48.745ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281042025-03-07T23:12:48.745ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281052025-03-07T23:12:48.745ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281062025-03-07T23:12:48.761ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
281072025-03-07T23:12:48.761ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281082025-03-07T23:12:48.761ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281092025-03-07T23:12:48.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281102025-03-07T23:12:48.788ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
281112025-03-07T23:12:48.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281122025-03-07T23:12:48.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
281132025-03-07T23:12:48.798ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
281142025-03-07T23:12:48.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281152025-03-07T23:12:48.799ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281162025-03-07T23:12:48.799ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281172025-03-07T23:12:48.803ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
281182025-03-07T23:12:48.803ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281192025-03-07T23:12:48.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281202025-03-07T23:12:48.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281212025-03-07T23:12:48.816ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
281222025-03-07T23:12:48.816ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281232025-03-07T23:12:48.817ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281242025-03-07T23:12:48.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281252025-03-07T23:12:48.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
281262025-03-07T23:12:48.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281272025-03-07T23:12:48.833ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281282025-03-07T23:12:48.833ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281292025-03-07T23:12:48.834ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281302025-03-07T23:12:48.837ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 162372 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4b23f40-9c63-4227-a160-f84ac3c01446 response_code = 200 uri = /v1/instances/demo-instance/disks?project=demo-project
281312025-03-07T23:12:48.838ZINFOtest_unauthorized (external client test context): client received response status = 200
281322025-03-07T23:12:48.838ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks?project=demo-project
281332025-03-07T23:12:48.838ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
281342025-03-07T23:12:48.839ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d uri = /v1/instances/demo-instance/disks?project=demo-project
281352025-03-07T23:12:48.839ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d uri = /v1/instances/demo-instance/disks?project=demo-project
281362025-03-07T23:12:48.839ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks?project=demo-project
281372025-03-07T23:12:48.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281382025-03-07T23:12:48.839ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281392025-03-07T23:12:48.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281402025-03-07T23:12:48.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281412025-03-07T23:12:48.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281422025-03-07T23:12:48.843ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281432025-03-07T23:12:48.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
281442025-03-07T23:12:48.845ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
281452025-03-07T23:12:48.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281462025-03-07T23:12:48.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281472025-03-07T23:12:48.846ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281482025-03-07T23:12:48.850ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
281492025-03-07T23:12:48.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281502025-03-07T23:12:48.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281512025-03-07T23:12:48.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281522025-03-07T23:12:48.854ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
281532025-03-07T23:12:48.857ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
281542025-03-07T23:12:48.857ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281552025-03-07T23:12:48.857ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281562025-03-07T23:12:48.858ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281572025-03-07T23:12:48.860ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
281582025-03-07T23:12:48.861ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
281592025-03-07T23:12:48.861ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281602025-03-07T23:12:48.861ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281612025-03-07T23:12:48.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281622025-03-07T23:12:48.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
281632025-03-07T23:12:48.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281642025-03-07T23:12:48.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281652025-03-07T23:12:48.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281662025-03-07T23:12:48.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
281672025-03-07T23:12:48.869ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
281682025-03-07T23:12:48.870ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d uri = /v1/instances/demo-instance/disks?project=demo-project
281692025-03-07T23:12:48.870ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281702025-03-07T23:12:48.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281712025-03-07T23:12:48.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281722025-03-07T23:12:48.872ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281732025-03-07T23:12:48.873ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281742025-03-07T23:12:48.873ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281752025-03-07T23:12:48.875ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281762025-03-07T23:12:48.876ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281772025-03-07T23:12:48.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281782025-03-07T23:12:48.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
281792025-03-07T23:12:48.881ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
281802025-03-07T23:12:48.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281812025-03-07T23:12:48.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281822025-03-07T23:12:48.884ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281832025-03-07T23:12:48.887ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
281842025-03-07T23:12:48.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281852025-03-07T23:12:48.887ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281862025-03-07T23:12:48.888ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281872025-03-07T23:12:48.892ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
281882025-03-07T23:12:48.893ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
281892025-03-07T23:12:48.893ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281902025-03-07T23:12:48.893ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
281912025-03-07T23:12:48.895ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
281922025-03-07T23:12:48.916ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks?project=demo-project
281932025-03-07T23:12:48.917ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 78145 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 24abd5d3-10e8-4abc-9ea5-a3fd39f0417d response_code = 404 uri = /v1/instances/demo-instance/disks?project=demo-project
281942025-03-07T23:12:48.917ZINFOtest_unauthorized (external client test context): client received response status = 404
281952025-03-07T23:12:48.918ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks?project=demo-project
281962025-03-07T23:12:48.918ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
281972025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14e5822d-f032-4339-9c68-737ce940477b uri = /v1/instances/demo-instance/disks?project=demo-project
281982025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14e5822d-f032-4339-9c68-737ce940477b uri = /v1/instances/demo-instance/disks?project=demo-project
281992025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14e5822d-f032-4339-9c68-737ce940477b uri = /v1/instances/demo-instance/disks?project=demo-project
282002025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14e5822d-f032-4339-9c68-737ce940477b uri = /v1/instances/demo-instance/disks?project=demo-project
282012025-03-07T23:12:48.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 379 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 14e5822d-f032-4339-9c68-737ce940477b response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
282022025-03-07T23:12:48.919ZINFOtest_unauthorized (external client test context): client received response status = 401
282032025-03-07T23:12:48.919ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks?project=demo-project
282042025-03-07T23:12:48.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282052025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b658c0d2-09c4-4778-870b-e5075dd855bc uri = /v1/instances/demo-instance/disks?project=demo-project
282062025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b658c0d2-09c4-4778-870b-e5075dd855bc uri = /v1/instances/demo-instance/disks?project=demo-project
282072025-03-07T23:12:48.919ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b658c0d2-09c4-4778-870b-e5075dd855bc uri = /v1/instances/demo-instance/disks?project=demo-project
282082025-03-07T23:12:48.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 484 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b658c0d2-09c4-4778-870b-e5075dd855bc response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
282092025-03-07T23:12:48.920ZINFOtest_unauthorized (external client test context): client received response status = 401
282102025-03-07T23:12:48.920ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks?project=demo-project
282112025-03-07T23:12:48.920ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282122025-03-07T23:12:48.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 03055459-da61-4041-81a4-c0c19b725408 uri = /v1/instances/demo-instance/disks?project=demo-project
282132025-03-07T23:12:48.921ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 03055459-da61-4041-81a4-c0c19b725408 uri = /v1/instances/demo-instance/disks?project=demo-project
282142025-03-07T23:12:48.922ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2421:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2444:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 03055459-da61-4041-81a4-c0c19b725408 uri = /v1/instances/demo-instance/disks?project=demo-project
282152025-03-07T23:12:48.922ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1527 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 03055459-da61-4041-81a4-c0c19b725408 response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
282162025-03-07T23:12:48.922ZINFOtest_unauthorized (external client test context): client received response status = 401
282172025-03-07T23:12:48.923ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
282182025-03-07T23:12:48.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282192025-03-07T23:12:48.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 161686d7-0959-4cf8-98d6-6cb62c37b58e uri = /v1/instances/demo-instance/disks?project=demo-project
282202025-03-07T23:12:48.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 161686d7-0959-4cf8-98d6-6cb62c37b58e response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282212025-03-07T23:12:48.924ZINFOtest_unauthorized (external client test context): client received response status = 405
282222025-03-07T23:12:48.924ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
282232025-03-07T23:12:48.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282242025-03-07T23:12:48.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = eb027056-f59a-45d0-8807-4c7eeaa4fc4c uri = /v1/instances/demo-instance/disks?project=demo-project
282252025-03-07T23:12:48.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = eb027056-f59a-45d0-8807-4c7eeaa4fc4c response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282262025-03-07T23:12:48.924ZINFOtest_unauthorized (external client test context): client received response status = 405
282272025-03-07T23:12:48.924ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
282282025-03-07T23:12:48.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282292025-03-07T23:12:48.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 13b9bca8-16fe-4a20-9be5-edb8971e3362 uri = /v1/instances/demo-instance/disks?project=demo-project
282302025-03-07T23:12:48.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 13b9bca8-16fe-4a20-9be5-edb8971e3362 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282312025-03-07T23:12:48.926ZINFOtest_unauthorized (external client test context): client received response status = 405
282322025-03-07T23:12:48.926ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
282332025-03-07T23:12:48.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282342025-03-07T23:12:48.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 51bd9ba3-2b1f-4780-9169-cbe52e9fc417 uri = /v1/instances/demo-instance/disks?project=demo-project
282352025-03-07T23:12:48.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 51bd9ba3-2b1f-4780-9169-cbe52e9fc417 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282362025-03-07T23:12:48.926ZINFOtest_unauthorized (external client test context): client received response status = 405
282372025-03-07T23:12:48.926ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks?project=demo-project
282382025-03-07T23:12:48.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282392025-03-07T23:12:48.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 199af961-5fff-412b-b012-3f9703f8988e uri = /v1/instances/demo-instance/disks?project=demo-project
282402025-03-07T23:12:48.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 199af961-5fff-412b-b012-3f9703f8988e response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282412025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client received response status = 405
282422025-03-07T23:12:48.928ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks?project=demo-project
282432025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282442025-03-07T23:12:48.928ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 949cc5e5-8f83-47bd-a355-08c5d6cf4f12 uri = /v1/instances/demo-instance/disks?project=demo-project
282452025-03-07T23:12:48.928ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 949cc5e5-8f83-47bd-a355-08c5d6cf4f12 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282462025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client received response status = 405
282472025-03-07T23:12:48.928ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks?project=demo-project
282482025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282492025-03-07T23:12:48.928ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a860d1b-cf65-44d5-9f38-7d2934ba6cd3 uri = /v1/instances/demo-instance/disks?project=demo-project
282502025-03-07T23:12:48.928ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3a860d1b-cf65-44d5-9f38-7d2934ba6cd3 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282512025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client received response status = 405
282522025-03-07T23:12:48.928ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks?project=demo-project
282532025-03-07T23:12:48.928ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282542025-03-07T23:12:48.929ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e8eeed1-69b6-4f31-9c76-79cd20a01073 uri = /v1/instances/demo-instance/disks?project=demo-project
282552025-03-07T23:12:48.929ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e8eeed1-69b6-4f31-9c76-79cd20a01073 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282562025-03-07T23:12:48.930ZINFOtest_unauthorized (external client test context): client received response status = 405
282572025-03-07T23:12:48.930ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
282582025-03-07T23:12:48.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282592025-03-07T23:12:48.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0ab69ea8-055a-4e50-8c09-0e572b651bea uri = /v1/instances/demo-instance/disks?project=demo-project
282602025-03-07T23:12:48.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0ab69ea8-055a-4e50-8c09-0e572b651bea response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282612025-03-07T23:12:48.930ZINFOtest_unauthorized (external client test context): client received response status = 405
282622025-03-07T23:12:48.930ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
282632025-03-07T23:12:48.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282642025-03-07T23:12:48.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9211c6f0-5637-42a3-89fc-db49209c5f3b uri = /v1/instances/demo-instance/disks?project=demo-project
282652025-03-07T23:12:48.931ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9211c6f0-5637-42a3-89fc-db49209c5f3b response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282662025-03-07T23:12:48.931ZINFOtest_unauthorized (external client test context): client received response status = 405
282672025-03-07T23:12:48.931ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
282682025-03-07T23:12:48.931ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282692025-03-07T23:12:48.931ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 36037174-21ca-432f-a54b-9ff5f21498b7 uri = /v1/instances/demo-instance/disks?project=demo-project
282702025-03-07T23:12:48.931ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 36037174-21ca-432f-a54b-9ff5f21498b7 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282712025-03-07T23:12:48.932ZINFOtest_unauthorized (external client test context): client received response status = 405
282722025-03-07T23:12:48.932ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
282732025-03-07T23:12:48.932ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282742025-03-07T23:12:48.932ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b77b2ec0-cb18-4be3-aff8-a42a2ba1d2c6 uri = /v1/instances/demo-instance/disks?project=demo-project
282752025-03-07T23:12:48.932ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b77b2ec0-cb18-4be3-aff8-a42a2ba1d2c6 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282762025-03-07T23:12:48.932ZINFOtest_unauthorized (external client test context): client received response status = 405
282772025-03-07T23:12:48.932ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
282782025-03-07T23:12:48.932ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282792025-03-07T23:12:48.932ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 100cdb27-c002-431a-9b87-ff31eed07a31 uri = /v1/instances/demo-instance/disks?project=demo-project
282802025-03-07T23:12:48.932ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 100cdb27-c002-431a-9b87-ff31eed07a31 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282812025-03-07T23:12:48.932ZINFOtest_unauthorized (external client test context): client received response status = 405
282822025-03-07T23:12:48.933ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
282832025-03-07T23:12:48.933ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282842025-03-07T23:12:48.933ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 54632668-73c8-4a1c-96d1-5078ae10a54f uri = /v1/instances/demo-instance/disks?project=demo-project
282852025-03-07T23:12:48.933ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 54632668-73c8-4a1c-96d1-5078ae10a54f response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282862025-03-07T23:12:48.933ZINFOtest_unauthorized (external client test context): client received response status = 405
282872025-03-07T23:12:48.933ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
282882025-03-07T23:12:48.933ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282892025-03-07T23:12:48.933ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ba89eaf9-c239-480a-a108-24db3ec2c0b0 uri = /v1/instances/demo-instance/disks?project=demo-project
282902025-03-07T23:12:48.933ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ba89eaf9-c239-480a-a108-24db3ec2c0b0 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282912025-03-07T23:12:48.934ZINFOtest_unauthorized (external client test context): client received response status = 405
282922025-03-07T23:12:48.934ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
282932025-03-07T23:12:48.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282942025-03-07T23:12:48.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b7a30267-bfe0-47a5-95c0-673e670f6287 uri = /v1/instances/demo-instance/disks?project=demo-project
282952025-03-07T23:12:48.935ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b7a30267-bfe0-47a5-95c0-673e670f6287 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
282962025-03-07T23:12:48.935ZINFOtest_unauthorized (external client test context): client received response status = 405
282972025-03-07T23:12:48.935ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks?project=demo-project
282982025-03-07T23:12:48.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks?project=demo-project
282992025-03-07T23:12:48.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 uri = /v1/instances/demo-instance/disks?project=demo-project
283002025-03-07T23:12:48.935ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 uri = /v1/instances/demo-instance/disks?project=demo-project
283012025-03-07T23:12:48.935ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/disks?project=demo-project
283022025-03-07T23:12:48.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283032025-03-07T23:12:48.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283042025-03-07T23:12:48.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283052025-03-07T23:12:48.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283062025-03-07T23:12:48.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283072025-03-07T23:12:48.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283082025-03-07T23:12:48.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
283092025-03-07T23:12:48.943ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
283102025-03-07T23:12:48.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283112025-03-07T23:12:48.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283122025-03-07T23:12:48.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283132025-03-07T23:12:48.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
283142025-03-07T23:12:48.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283152025-03-07T23:12:48.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283162025-03-07T23:12:48.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283172025-03-07T23:12:48.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
283182025-03-07T23:12:48.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
283192025-03-07T23:12:48.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283202025-03-07T23:12:48.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283212025-03-07T23:12:48.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283222025-03-07T23:12:48.952ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
283232025-03-07T23:12:48.952ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
283242025-03-07T23:12:48.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283252025-03-07T23:12:48.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283262025-03-07T23:12:48.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283272025-03-07T23:12:48.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
283282025-03-07T23:12:48.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283292025-03-07T23:12:48.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283302025-03-07T23:12:48.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283312025-03-07T23:12:48.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
283322025-03-07T23:12:48.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
283332025-03-07T23:12:48.966ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 uri = /v1/instances/demo-instance/disks?project=demo-project
283342025-03-07T23:12:48.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283352025-03-07T23:12:48.967ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283362025-03-07T23:12:48.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283372025-03-07T23:12:48.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283382025-03-07T23:12:48.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283392025-03-07T23:12:48.976ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283402025-03-07T23:12:48.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283412025-03-07T23:12:48.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283422025-03-07T23:12:48.976ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283432025-03-07T23:12:48.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
283442025-03-07T23:12:48.976ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
283452025-03-07T23:12:48.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283462025-03-07T23:12:48.979ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283472025-03-07T23:12:48.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283482025-03-07T23:12:48.979ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
283492025-03-07T23:12:48.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283502025-03-07T23:12:48.981ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283512025-03-07T23:12:48.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283522025-03-07T23:12:48.983ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
283532025-03-07T23:12:48.984ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283542025-03-07T23:12:48.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283552025-03-07T23:12:48.985ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283562025-03-07T23:12:49.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
283572025-03-07T23:12:49.022ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283582025-03-07T23:12:49.023ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
283592025-03-07T23:12:49.023ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
283602025-03-07T23:12:49.023ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283612025-03-07T23:12:49.023ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283622025-03-07T23:12:49.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283632025-03-07T23:12:49.039ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
283642025-03-07T23:12:49.040ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283652025-03-07T23:12:49.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283662025-03-07T23:12:49.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283672025-03-07T23:12:49.051ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
283682025-03-07T23:12:49.051ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283692025-03-07T23:12:49.051ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283702025-03-07T23:12:49.051ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283712025-03-07T23:12:49.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
283722025-03-07T23:12:49.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283732025-03-07T23:12:49.067ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
283742025-03-07T23:12:49.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
283752025-03-07T23:12:49.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
283762025-03-07T23:12:49.069ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 136624 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 29b3f507-bd86-449f-8c74-f5f725840335 response_code = 200 uri = /v1/instances/demo-instance/disks?project=demo-project
283772025-03-07T23:12:49.070ZINFOtest_unauthorized (external client test context): client received response status = 200
283782025-03-07T23:12:49.071ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks/attach?project=demo-project
283792025-03-07T23:12:49.071ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/disks/attach?project=demo-project
283802025-03-07T23:12:49.071ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
283812025-03-07T23:12:49.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
283822025-03-07T23:12:49.071ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6da03b31-52ea-4507-9d80-e647673d4f88 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283832025-03-07T23:12:49.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6da03b31-52ea-4507-9d80-e647673d4f88 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283842025-03-07T23:12:49.071ZINFOtest_unauthorized (external client test context): client received response status = 405
283852025-03-07T23:12:49.071ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
283862025-03-07T23:12:49.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
283872025-03-07T23:12:49.071ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00aa4fbd-ece8-46fb-9aff-c1b485fda033 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283882025-03-07T23:12:49.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 00aa4fbd-ece8-46fb-9aff-c1b485fda033 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283892025-03-07T23:12:49.071ZINFOtest_unauthorized (external client test context): client received response status = 405
283902025-03-07T23:12:49.071ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
283912025-03-07T23:12:49.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
283922025-03-07T23:12:49.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ec1e6bc2-a3b3-4eb1-84d1-916f81bd8c82 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283932025-03-07T23:12:49.076ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ec1e6bc2-a3b3-4eb1-84d1-916f81bd8c82 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283942025-03-07T23:12:49.077ZINFOtest_unauthorized (external client test context): client received response status = 405
283952025-03-07T23:12:49.081ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
283962025-03-07T23:12:49.081ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
283972025-03-07T23:12:49.081ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 554009de-5ce3-42db-a492-32a7d4c5eba5 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283982025-03-07T23:12:49.081ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 554009de-5ce3-42db-a492-32a7d4c5eba5 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
283992025-03-07T23:12:49.081ZINFOtest_unauthorized (external client test context): client received response status = 405
284002025-03-07T23:12:49.081ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
284012025-03-07T23:12:49.081ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284022025-03-07T23:12:49.081ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b935d23e-bd25-421a-93c3-6f9c418488e2 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284032025-03-07T23:12:49.081ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b935d23e-bd25-421a-93c3-6f9c418488e2 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284042025-03-07T23:12:49.081ZINFOtest_unauthorized (external client test context): client received response status = 405
284052025-03-07T23:12:49.081ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
284062025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284072025-03-07T23:12:49.082ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 49e9ee2c-6f22-4aea-a20e-c723436b21d2 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284082025-03-07T23:12:49.082ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 49e9ee2c-6f22-4aea-a20e-c723436b21d2 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284092025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client received response status = 405
284102025-03-07T23:12:49.082ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
284112025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284122025-03-07T23:12:49.082ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3339c491-36f0-4947-9a21-d1f04d542037 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284132025-03-07T23:12:49.082ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3339c491-36f0-4947-9a21-d1f04d542037 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284142025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client received response status = 405
284152025-03-07T23:12:49.082ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
284162025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284172025-03-07T23:12:49.082ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ef2c6c7-bd7e-49ee-9243-b1b8f201b7cc uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284182025-03-07T23:12:49.082ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1ef2c6c7-bd7e-49ee-9243-b1b8f201b7cc response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284192025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client received response status = 405
284202025-03-07T23:12:49.082ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
284212025-03-07T23:12:49.082ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284222025-03-07T23:12:49.083ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284232025-03-07T23:12:49.083ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284242025-03-07T23:12:49.083ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284252025-03-07T23:12:49.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284262025-03-07T23:12:49.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284272025-03-07T23:12:49.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284282025-03-07T23:12:49.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284292025-03-07T23:12:49.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284302025-03-07T23:12:49.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284312025-03-07T23:12:49.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
284322025-03-07T23:12:49.083ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
284332025-03-07T23:12:49.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284342025-03-07T23:12:49.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284352025-03-07T23:12:49.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284362025-03-07T23:12:49.086ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
284372025-03-07T23:12:49.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284382025-03-07T23:12:49.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284392025-03-07T23:12:49.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284402025-03-07T23:12:49.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
284412025-03-07T23:12:49.093ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
284422025-03-07T23:12:49.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284432025-03-07T23:12:49.094ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284442025-03-07T23:12:49.094ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284452025-03-07T23:12:49.095ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
284462025-03-07T23:12:49.097ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
284472025-03-07T23:12:49.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284482025-03-07T23:12:49.098ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284492025-03-07T23:12:49.098ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284502025-03-07T23:12:49.098ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
284512025-03-07T23:12:49.098ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284522025-03-07T23:12:49.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284532025-03-07T23:12:49.099ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284542025-03-07T23:12:49.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
284552025-03-07T23:12:49.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
284562025-03-07T23:12:49.104ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284572025-03-07T23:12:49.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284582025-03-07T23:12:49.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284592025-03-07T23:12:49.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284602025-03-07T23:12:49.107ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284612025-03-07T23:12:49.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284622025-03-07T23:12:49.108ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284632025-03-07T23:12:49.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284642025-03-07T23:12:49.112ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284652025-03-07T23:12:49.112ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284662025-03-07T23:12:49.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284672025-03-07T23:12:49.114ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284682025-03-07T23:12:49.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284692025-03-07T23:12:49.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284702025-03-07T23:12:49.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284712025-03-07T23:12:49.117ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284722025-03-07T23:12:49.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284732025-03-07T23:12:49.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284742025-03-07T23:12:49.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284752025-03-07T23:12:49.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284762025-03-07T23:12:49.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284772025-03-07T23:12:49.127ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284782025-03-07T23:12:49.128ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284792025-03-07T23:12:49.128ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284802025-03-07T23:12:49.143ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284812025-03-07T23:12:49.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 67139 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 97517360-d44b-4e24-96fc-1982c9312a63 response_code = 404 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284822025-03-07T23:12:49.145ZINFOtest_unauthorized (external client test context): client received response status = 404
284832025-03-07T23:12:49.145ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
284842025-03-07T23:12:49.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284852025-03-07T23:12:49.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59b35ba1-a346-4075-988c-6a53dff77b89 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284862025-03-07T23:12:49.145ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59b35ba1-a346-4075-988c-6a53dff77b89 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284872025-03-07T23:12:49.145ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59b35ba1-a346-4075-988c-6a53dff77b89 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284882025-03-07T23:12:49.145ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59b35ba1-a346-4075-988c-6a53dff77b89 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284892025-03-07T23:12:49.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 407 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 59b35ba1-a346-4075-988c-6a53dff77b89 response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284902025-03-07T23:12:49.146ZINFOtest_unauthorized (external client test context): client received response status = 401
284912025-03-07T23:12:49.146ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
284922025-03-07T23:12:49.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
284932025-03-07T23:12:49.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 33581926-3e95-4391-b18e-1b2dd5fe2885 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284942025-03-07T23:12:49.146ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 33581926-3e95-4391-b18e-1b2dd5fe2885 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284952025-03-07T23:12:49.146ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 33581926-3e95-4391-b18e-1b2dd5fe2885 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284962025-03-07T23:12:49.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 260 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 33581926-3e95-4391-b18e-1b2dd5fe2885 response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
284972025-03-07T23:12:49.146ZINFOtest_unauthorized (external client test context): client received response status = 401
284982025-03-07T23:12:49.146ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
284992025-03-07T23:12:49.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285002025-03-07T23:12:49.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 563a55d9-812d-4941-8bfd-46ce615e18b8 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285012025-03-07T23:12:49.152ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 563a55d9-812d-4941-8bfd-46ce615e18b8 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285022025-03-07T23:12:49.154ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2460:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2476:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 563a55d9-812d-4941-8bfd-46ce615e18b8 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285032025-03-07T23:12:49.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2429 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 563a55d9-812d-4941-8bfd-46ce615e18b8 response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285042025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client received response status = 401
285052025-03-07T23:12:49.154ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285062025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285072025-03-07T23:12:49.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8f545db2-fc3c-40fa-8984-b705c2251350 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285082025-03-07T23:12:49.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8f545db2-fc3c-40fa-8984-b705c2251350 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285092025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client received response status = 405
285102025-03-07T23:12:49.154ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285112025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285122025-03-07T23:12:49.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e9caabfb-212d-459b-a530-2b20eed5d679 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285132025-03-07T23:12:49.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e9caabfb-212d-459b-a530-2b20eed5d679 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285142025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client received response status = 405
285152025-03-07T23:12:49.154ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285162025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285172025-03-07T23:12:49.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ce1e96e6-dcc2-4620-a455-8e33a267abdf uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285182025-03-07T23:12:49.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ce1e96e6-dcc2-4620-a455-8e33a267abdf response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285192025-03-07T23:12:49.154ZINFOtest_unauthorized (external client test context): client received response status = 405
285202025-03-07T23:12:49.154ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285212025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285222025-03-07T23:12:49.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1512663a-3d11-4f95-b570-7d335ba39305 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285232025-03-07T23:12:49.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1512663a-3d11-4f95-b570-7d335ba39305 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285242025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client received response status = 405
285252025-03-07T23:12:49.155ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285262025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285272025-03-07T23:12:49.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a198c3f6-45d4-4997-95eb-6ab66db6cd9d uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285282025-03-07T23:12:49.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a198c3f6-45d4-4997-95eb-6ab66db6cd9d response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285292025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client received response status = 405
285302025-03-07T23:12:49.155ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285312025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285322025-03-07T23:12:49.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f39e09e6-703b-4c99-9731-b46891d7c35f uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285332025-03-07T23:12:49.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f39e09e6-703b-4c99-9731-b46891d7c35f response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285342025-03-07T23:12:49.155ZINFOtest_unauthorized (external client test context): client received response status = 405
285352025-03-07T23:12:49.155ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285362025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285372025-03-07T23:12:49.157ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 917f6323-4b1e-413d-b516-dca7249c5c7d uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285382025-03-07T23:12:49.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 917f6323-4b1e-413d-b516-dca7249c5c7d response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285392025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client received response status = 405
285402025-03-07T23:12:49.157ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
285412025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/attach?project=demo-project
285422025-03-07T23:12:49.157ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bf05ae79-8c7c-4505-99dd-dc3e88fdf7f8 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285432025-03-07T23:12:49.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bf05ae79-8c7c-4505-99dd-dc3e88fdf7f8 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
285442025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client received response status = 405
285452025-03-07T23:12:49.157ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks/attach?project=demo-project
285462025-03-07T23:12:49.157ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks/detach?project=demo-project
285472025-03-07T23:12:49.157ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/disks/detach?project=demo-project
285482025-03-07T23:12:49.157ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
285492025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285502025-03-07T23:12:49.157ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6b5c956f-038c-4613-a4aa-5d4223f093ef uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285512025-03-07T23:12:49.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6b5c956f-038c-4613-a4aa-5d4223f093ef response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285522025-03-07T23:12:49.157ZINFOtest_unauthorized (external client test context): client received response status = 405
285532025-03-07T23:12:49.166ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
285542025-03-07T23:12:49.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285552025-03-07T23:12:49.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b0b4a8d3-7739-41f7-a888-e3368a228d30 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285562025-03-07T23:12:49.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b0b4a8d3-7739-41f7-a888-e3368a228d30 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285572025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client received response status = 405
285582025-03-07T23:12:49.167ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
285592025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285602025-03-07T23:12:49.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f46cc15-43e4-4434-aa49-f121223f60c1 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285612025-03-07T23:12:49.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f46cc15-43e4-4434-aa49-f121223f60c1 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285622025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client received response status = 405
285632025-03-07T23:12:49.167ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
285642025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285652025-03-07T23:12:49.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7bc8bbbe-62c6-4b41-9224-037c32e44e4a uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285662025-03-07T23:12:49.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7bc8bbbe-62c6-4b41-9224-037c32e44e4a response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285672025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client received response status = 405
285682025-03-07T23:12:49.167ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
285692025-03-07T23:12:49.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285702025-03-07T23:12:49.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7772fb59-99e1-47bc-a6e8-39129f48bd23 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285712025-03-07T23:12:49.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7772fb59-99e1-47bc-a6e8-39129f48bd23 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285722025-03-07T23:12:49.168ZINFOtest_unauthorized (external client test context): client received response status = 405
285732025-03-07T23:12:49.168ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
285742025-03-07T23:12:49.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285752025-03-07T23:12:49.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bace5987-567e-4485-b244-134c3b845b17 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285762025-03-07T23:12:49.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bace5987-567e-4485-b244-134c3b845b17 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285772025-03-07T23:12:49.168ZINFOtest_unauthorized (external client test context): client received response status = 405
285782025-03-07T23:12:49.168ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
285792025-03-07T23:12:49.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285802025-03-07T23:12:49.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = da52c298-86a0-43ea-ab06-01082771e858 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285812025-03-07T23:12:49.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = da52c298-86a0-43ea-ab06-01082771e858 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285822025-03-07T23:12:49.168ZINFOtest_unauthorized (external client test context): client received response status = 405
285832025-03-07T23:12:49.168ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
285842025-03-07T23:12:49.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285852025-03-07T23:12:49.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e0be390d-9f1c-461c-be5c-dbeac6456d1d uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285862025-03-07T23:12:49.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e0be390d-9f1c-461c-be5c-dbeac6456d1d response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285872025-03-07T23:12:49.170ZINFOtest_unauthorized (external client test context): client received response status = 405
285882025-03-07T23:12:49.170ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
285892025-03-07T23:12:49.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
285902025-03-07T23:12:49.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285912025-03-07T23:12:49.171ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285922025-03-07T23:12:49.171ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
285932025-03-07T23:12:49.172ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285942025-03-07T23:12:49.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285952025-03-07T23:12:49.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285962025-03-07T23:12:49.173ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285972025-03-07T23:12:49.173ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285982025-03-07T23:12:49.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285992025-03-07T23:12:49.173ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
286002025-03-07T23:12:49.173ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
286012025-03-07T23:12:49.173ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286022025-03-07T23:12:49.173ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286032025-03-07T23:12:49.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286042025-03-07T23:12:49.177ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
286052025-03-07T23:12:49.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286062025-03-07T23:12:49.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286072025-03-07T23:12:49.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286082025-03-07T23:12:49.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
286092025-03-07T23:12:49.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
286102025-03-07T23:12:49.186ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286112025-03-07T23:12:49.186ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286122025-03-07T23:12:49.186ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286132025-03-07T23:12:49.189ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
286142025-03-07T23:12:49.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
286152025-03-07T23:12:49.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286162025-03-07T23:12:49.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286172025-03-07T23:12:49.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286182025-03-07T23:12:49.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
286192025-03-07T23:12:49.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286202025-03-07T23:12:49.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286212025-03-07T23:12:49.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286222025-03-07T23:12:49.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
286232025-03-07T23:12:49.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
286242025-03-07T23:12:49.197ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286252025-03-07T23:12:49.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286262025-03-07T23:12:49.198ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286272025-03-07T23:12:49.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286282025-03-07T23:12:49.200ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286292025-03-07T23:12:49.201ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286302025-03-07T23:12:49.201ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286312025-03-07T23:12:49.202ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286322025-03-07T23:12:49.202ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286332025-03-07T23:12:49.203ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286342025-03-07T23:12:49.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286352025-03-07T23:12:49.206ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286362025-03-07T23:12:49.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286372025-03-07T23:12:49.207ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286382025-03-07T23:12:49.207ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286392025-03-07T23:12:49.208ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286402025-03-07T23:12:49.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286412025-03-07T23:12:49.208ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286422025-03-07T23:12:49.209ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286432025-03-07T23:12:49.213ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286442025-03-07T23:12:49.213ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286452025-03-07T23:12:49.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286462025-03-07T23:12:49.215ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286472025-03-07T23:12:49.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286482025-03-07T23:12:49.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286492025-03-07T23:12:49.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
286502025-03-07T23:12:49.219ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
286512025-03-07T23:12:49.219ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286522025-03-07T23:12:49.241ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286532025-03-07T23:12:49.242ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 82931 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4c2a6403-0f6b-4a9f-a8d0-9aa828ab0886 response_code = 404 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286542025-03-07T23:12:49.243ZINFOtest_unauthorized (external client test context): client received response status = 404
286552025-03-07T23:12:49.244ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
286562025-03-07T23:12:49.244ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286572025-03-07T23:12:49.244ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 826d3275-3c9f-4509-a876-7c907f488781 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286582025-03-07T23:12:49.244ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 826d3275-3c9f-4509-a876-7c907f488781 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286592025-03-07T23:12:49.245ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 826d3275-3c9f-4509-a876-7c907f488781 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286602025-03-07T23:12:49.245ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 826d3275-3c9f-4509-a876-7c907f488781 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286612025-03-07T23:12:49.245ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 933 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 826d3275-3c9f-4509-a876-7c907f488781 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286622025-03-07T23:12:49.245ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
286632025-03-07T23:12:49.247ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
286642025-03-07T23:12:49.247ZINFOtest_unauthorized (external client test context): client received response status = 401
286652025-03-07T23:12:49.250ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
286662025-03-07T23:12:49.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286672025-03-07T23:12:49.251ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d352227-5794-4a91-8b5c-38b7406e37b2 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286682025-03-07T23:12:49.251ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d352227-5794-4a91-8b5c-38b7406e37b2 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286692025-03-07T23:12:49.251ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d352227-5794-4a91-8b5c-38b7406e37b2 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286702025-03-07T23:12:49.251ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 302 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d352227-5794-4a91-8b5c-38b7406e37b2 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286712025-03-07T23:12:49.251ZINFOtest_unauthorized (external client test context): client received response status = 401
286722025-03-07T23:12:49.253ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
286732025-03-07T23:12:49.253ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286742025-03-07T23:12:49.253ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a48c67ff-eaf4-4a23-a76d-b9c906a33436 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286752025-03-07T23:12:49.253ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a48c67ff-eaf4-4a23-a76d-b9c906a33436 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286762025-03-07T23:12:49.254ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2488:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2508:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a48c67ff-eaf4-4a23-a76d-b9c906a33436 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286772025-03-07T23:12:49.255ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 920 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a48c67ff-eaf4-4a23-a76d-b9c906a33436 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286782025-03-07T23:12:49.255ZINFOtest_unauthorized (external client test context): client received response status = 401
286792025-03-07T23:12:49.255ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
286802025-03-07T23:12:49.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286812025-03-07T23:12:49.255ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c1ced21-db17-41d2-b9d3-432e07d26667 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286822025-03-07T23:12:49.255ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5c1ced21-db17-41d2-b9d3-432e07d26667 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286832025-03-07T23:12:49.255ZINFOtest_unauthorized (external client test context): client received response status = 405
286842025-03-07T23:12:49.255ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
286852025-03-07T23:12:49.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286862025-03-07T23:12:49.255ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3e2cefd4-eb9e-44c0-9947-6bb824e2f924 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286872025-03-07T23:12:49.257ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3e2cefd4-eb9e-44c0-9947-6bb824e2f924 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286882025-03-07T23:12:49.257ZINFOtest_unauthorized (external client test context): client received response status = 405
286892025-03-07T23:12:49.257ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
286902025-03-07T23:12:49.257ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286912025-03-07T23:12:49.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fb11ee0e-dfd5-4931-9959-05131fc7f45e uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286922025-03-07T23:12:49.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fb11ee0e-dfd5-4931-9959-05131fc7f45e response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286932025-03-07T23:12:49.259ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
286942025-03-07T23:12:49.259ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286952025-03-07T23:12:49.259ZINFOtest_unauthorized (external client test context): client received response status = 405
286962025-03-07T23:12:49.259ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
286972025-03-07T23:12:49.259ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
286982025-03-07T23:12:49.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ccad69e4-54cd-43e8-b4b1-194049a9a627 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
286992025-03-07T23:12:49.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ccad69e4-54cd-43e8-b4b1-194049a9a627 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287002025-03-07T23:12:49.259ZINFOtest_unauthorized (external client test context): client received response status = 405
287012025-03-07T23:12:49.259ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
287022025-03-07T23:12:49.260ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
287032025-03-07T23:12:49.260ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = debd894e-bd44-4e0c-a4a8-b0461cbc0983 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287042025-03-07T23:12:49.260ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = debd894e-bd44-4e0c-a4a8-b0461cbc0983 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287052025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client received response status = 405
287062025-03-07T23:12:49.261ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
287072025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
287082025-03-07T23:12:49.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe57a24a-fcfd-490c-a56f-d0c1e7798cbf uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287092025-03-07T23:12:49.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fe57a24a-fcfd-490c-a56f-d0c1e7798cbf response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287102025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client received response status = 405
287112025-03-07T23:12:49.261ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
287122025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
287132025-03-07T23:12:49.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 169a39f3-13ef-4455-b328-e548f5bc1234 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287142025-03-07T23:12:49.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 169a39f3-13ef-4455-b328-e548f5bc1234 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287152025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client received response status = 405
287162025-03-07T23:12:49.261ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
287172025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/disks/detach?project=demo-project
287182025-03-07T23:12:49.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 03222528-6a72-4a62-a147-f2de79d50b8d uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287192025-03-07T23:12:49.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 03222528-6a72-4a62-a147-f2de79d50b8d response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
287202025-03-07T23:12:49.261ZINFOtest_unauthorized (external client test context): client received response status = 405
287212025-03-07T23:12:49.261ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks/detach?project=demo-project
287222025-03-07T23:12:49.261ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups?project=demo-project
287232025-03-07T23:12:49.262ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups?project=demo-project
287242025-03-07T23:12:49.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
287252025-03-07T23:12:49.262ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 uri = /v1/affinity-groups?project=demo-project
287262025-03-07T23:12:49.262ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 uri = /v1/affinity-groups?project=demo-project
287272025-03-07T23:12:49.262ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
287282025-03-07T23:12:49.262ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287292025-03-07T23:12:49.262ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287302025-03-07T23:12:49.262ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287312025-03-07T23:12:49.262ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287322025-03-07T23:12:49.262ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287332025-03-07T23:12:49.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287342025-03-07T23:12:49.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
287352025-03-07T23:12:49.268ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
287362025-03-07T23:12:49.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287372025-03-07T23:12:49.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287382025-03-07T23:12:49.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287392025-03-07T23:12:49.283ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
287402025-03-07T23:12:49.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287412025-03-07T23:12:49.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287422025-03-07T23:12:49.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287432025-03-07T23:12:49.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
287442025-03-07T23:12:49.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
287452025-03-07T23:12:49.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287462025-03-07T23:12:49.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287472025-03-07T23:12:49.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287482025-03-07T23:12:49.295ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
287492025-03-07T23:12:49.295ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
287502025-03-07T23:12:49.295ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287512025-03-07T23:12:49.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287522025-03-07T23:12:49.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287532025-03-07T23:12:49.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
287542025-03-07T23:12:49.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287552025-03-07T23:12:49.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287562025-03-07T23:12:49.303ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287572025-03-07T23:12:49.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
287582025-03-07T23:12:49.308ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
287592025-03-07T23:12:49.308ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 uri = /v1/affinity-groups?project=demo-project
287602025-03-07T23:12:49.308ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287612025-03-07T23:12:49.308ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287622025-03-07T23:12:49.309ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287632025-03-07T23:12:49.311ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287642025-03-07T23:12:49.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287652025-03-07T23:12:49.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287662025-03-07T23:12:49.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
287672025-03-07T23:12:49.316ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
287682025-03-07T23:12:49.316ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287692025-03-07T23:12:49.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287702025-03-07T23:12:49.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287712025-03-07T23:12:49.318ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
287722025-03-07T23:12:49.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287732025-03-07T23:12:49.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287742025-03-07T23:12:49.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287752025-03-07T23:12:49.319ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
287762025-03-07T23:12:49.322ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
287772025-03-07T23:12:49.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287782025-03-07T23:12:49.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287792025-03-07T23:12:49.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287802025-03-07T23:12:49.325ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
287812025-03-07T23:12:49.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287822025-03-07T23:12:49.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
287832025-03-07T23:12:49.335ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
287842025-03-07T23:12:49.335ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287852025-03-07T23:12:49.335ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287862025-03-07T23:12:49.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287872025-03-07T23:12:49.339ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
287882025-03-07T23:12:49.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287892025-03-07T23:12:49.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287902025-03-07T23:12:49.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287912025-03-07T23:12:49.342ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
287922025-03-07T23:12:49.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287932025-03-07T23:12:49.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287942025-03-07T23:12:49.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287952025-03-07T23:12:49.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
287962025-03-07T23:12:49.353ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
287972025-03-07T23:12:49.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database uri = /v1/affinity-groups?project=demo-project
287982025-03-07T23:12:49.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
287992025-03-07T23:12:49.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288002025-03-07T23:12:49.373ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 118356 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b012c4e0-2a76-4eab-9cbe-d5277073b845 response_code = 200 uri = /v1/affinity-groups?project=demo-project
288012025-03-07T23:12:49.373ZINFOtest_unauthorized (external client test context): client received response status = 200
288022025-03-07T23:12:49.373ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups?project=demo-project
288032025-03-07T23:12:49.374ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288042025-03-07T23:12:49.374ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb uri = /v1/affinity-groups?project=demo-project
288052025-03-07T23:12:49.374ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb uri = /v1/affinity-groups?project=demo-project
288062025-03-07T23:12:49.374ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups?project=demo-project
288072025-03-07T23:12:49.374ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288082025-03-07T23:12:49.374ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288092025-03-07T23:12:49.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288102025-03-07T23:12:49.380ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288112025-03-07T23:12:49.381ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288122025-03-07T23:12:49.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288132025-03-07T23:12:49.383ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
288142025-03-07T23:12:49.383ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
288152025-03-07T23:12:49.383ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288162025-03-07T23:12:49.383ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288172025-03-07T23:12:49.384ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288182025-03-07T23:12:49.389ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
288192025-03-07T23:12:49.391ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288202025-03-07T23:12:49.391ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288212025-03-07T23:12:49.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288222025-03-07T23:12:49.394ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
288232025-03-07T23:12:49.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
288242025-03-07T23:12:49.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288252025-03-07T23:12:49.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288262025-03-07T23:12:49.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288272025-03-07T23:12:49.401ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
288282025-03-07T23:12:49.401ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
288292025-03-07T23:12:49.401ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288302025-03-07T23:12:49.401ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288312025-03-07T23:12:49.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288322025-03-07T23:12:49.404ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
288332025-03-07T23:12:49.405ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288342025-03-07T23:12:49.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288352025-03-07T23:12:49.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288362025-03-07T23:12:49.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
288372025-03-07T23:12:49.412ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
288382025-03-07T23:12:49.412ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb uri = /v1/affinity-groups?project=demo-project
288392025-03-07T23:12:49.413ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database uri = /v1/affinity-groups?project=demo-project
288402025-03-07T23:12:49.413ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288412025-03-07T23:12:49.413ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288422025-03-07T23:12:49.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database uri = /v1/affinity-groups?project=demo-project
288432025-03-07T23:12:49.415ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288442025-03-07T23:12:49.416ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288452025-03-07T23:12:49.417ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
288462025-03-07T23:12:49.418ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
288472025-03-07T23:12:49.419ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database uri = /v1/affinity-groups?project=demo-project
288482025-03-07T23:12:49.419ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288492025-03-07T23:12:49.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288502025-03-07T23:12:49.421ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
288512025-03-07T23:12:49.421ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database uri = /v1/affinity-groups?project=demo-project
288522025-03-07T23:12:49.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288532025-03-07T23:12:49.422ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288542025-03-07T23:12:49.425ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
288552025-03-07T23:12:49.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database uri = /v1/affinity-groups?project=demo-project
288562025-03-07T23:12:49.425ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288572025-03-07T23:12:49.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
288582025-03-07T23:12:49.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
288592025-03-07T23:12:49.454ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/affinity-groups?project=demo-project
288602025-03-07T23:12:49.454ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 79974 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216fccad-7efe-4f82-acb3-8d132ea12fbb response_code = 404 uri = /v1/affinity-groups?project=demo-project
288612025-03-07T23:12:49.455ZINFOtest_unauthorized (external client test context): client received response status = 404
288622025-03-07T23:12:49.455ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups?project=demo-project
288632025-03-07T23:12:49.455ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288642025-03-07T23:12:49.455ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9fda4819-08e3-4b61-b521-a0d7a2c5a333 uri = /v1/affinity-groups?project=demo-project
288652025-03-07T23:12:49.456ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9fda4819-08e3-4b61-b521-a0d7a2c5a333 uri = /v1/affinity-groups?project=demo-project
288662025-03-07T23:12:49.456ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9fda4819-08e3-4b61-b521-a0d7a2c5a333 uri = /v1/affinity-groups?project=demo-project
288672025-03-07T23:12:49.456ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9fda4819-08e3-4b61-b521-a0d7a2c5a333 uri = /v1/affinity-groups?project=demo-project
288682025-03-07T23:12:49.456ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 462 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9fda4819-08e3-4b61-b521-a0d7a2c5a333 response_code = 401 uri = /v1/affinity-groups?project=demo-project
288692025-03-07T23:12:49.456ZINFOtest_unauthorized (external client test context): client received response status = 401
288702025-03-07T23:12:49.456ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups?project=demo-project
288712025-03-07T23:12:49.456ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288722025-03-07T23:12:49.457ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d552dee-6889-45aa-8cd4-eaf5d2ebe170 uri = /v1/affinity-groups?project=demo-project
288732025-03-07T23:12:49.457ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d552dee-6889-45aa-8cd4-eaf5d2ebe170 uri = /v1/affinity-groups?project=demo-project
288742025-03-07T23:12:49.457ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d552dee-6889-45aa-8cd4-eaf5d2ebe170 uri = /v1/affinity-groups?project=demo-project
288752025-03-07T23:12:49.457ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 197 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1d552dee-6889-45aa-8cd4-eaf5d2ebe170 response_code = 401 uri = /v1/affinity-groups?project=demo-project
288762025-03-07T23:12:49.457ZINFOtest_unauthorized (external client test context): client received response status = 401
288772025-03-07T23:12:49.457ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups?project=demo-project
288782025-03-07T23:12:49.457ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288792025-03-07T23:12:49.457ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92cd0e67-869e-44fa-9e94-21eff1e601a7 uri = /v1/affinity-groups?project=demo-project
288802025-03-07T23:12:49.457ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92cd0e67-869e-44fa-9e94-21eff1e601a7 uri = /v1/affinity-groups?project=demo-project
288812025-03-07T23:12:49.458ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2522:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2542:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92cd0e67-869e-44fa-9e94-21eff1e601a7 uri = /v1/affinity-groups?project=demo-project
288822025-03-07T23:12:49.459ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1110 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 92cd0e67-869e-44fa-9e94-21eff1e601a7 response_code = 401 uri = /v1/affinity-groups?project=demo-project
288832025-03-07T23:12:49.459ZINFOtest_unauthorized (external client test context): client received response status = 401
288842025-03-07T23:12:49.459ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups?project=demo-project
288852025-03-07T23:12:49.459ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288862025-03-07T23:12:49.459ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aa068799-8985-457d-a4f1-a6e3fef85b41 uri = /v1/affinity-groups?project=demo-project
288872025-03-07T23:12:49.459ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aa068799-8985-457d-a4f1-a6e3fef85b41 response_code = 405 uri = /v1/affinity-groups?project=demo-project
288882025-03-07T23:12:49.459ZINFOtest_unauthorized (external client test context): client received response status = 405
288892025-03-07T23:12:49.459ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups?project=demo-project
288902025-03-07T23:12:49.460ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288912025-03-07T23:12:49.460ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a12db01-f434-4070-be3b-40b566180210 uri = /v1/affinity-groups?project=demo-project
288922025-03-07T23:12:49.460ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9a12db01-f434-4070-be3b-40b566180210 response_code = 405 uri = /v1/affinity-groups?project=demo-project
288932025-03-07T23:12:49.460ZINFOtest_unauthorized (external client test context): client received response status = 405
288942025-03-07T23:12:49.460ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups?project=demo-project
288952025-03-07T23:12:49.460ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
288962025-03-07T23:12:49.460ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca8a7d66-25f0-4549-980e-07121bc90c3d uri = /v1/affinity-groups?project=demo-project
288972025-03-07T23:12:49.460ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca8a7d66-25f0-4549-980e-07121bc90c3d response_code = 405 uri = /v1/affinity-groups?project=demo-project
288982025-03-07T23:12:49.461ZINFOtest_unauthorized (external client test context): client received response status = 405
288992025-03-07T23:12:49.461ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups?project=demo-project
289002025-03-07T23:12:49.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289012025-03-07T23:12:49.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0f625bdb-0552-4ba1-a5c9-147eca1cfcd2 uri = /v1/affinity-groups?project=demo-project
289022025-03-07T23:12:49.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0f625bdb-0552-4ba1-a5c9-147eca1cfcd2 response_code = 405 uri = /v1/affinity-groups?project=demo-project
289032025-03-07T23:12:49.461ZINFOtest_unauthorized (external client test context): client received response status = 405
289042025-03-07T23:12:49.461ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups?project=demo-project
289052025-03-07T23:12:49.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289062025-03-07T23:12:49.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 uri = /v1/affinity-groups?project=demo-project
289072025-03-07T23:12:49.461ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 uri = /v1/affinity-groups?project=demo-project
289082025-03-07T23:12:49.461ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups?project=demo-project
289092025-03-07T23:12:49.461ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289102025-03-07T23:12:49.461ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289112025-03-07T23:12:49.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289122025-03-07T23:12:49.466ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289132025-03-07T23:12:49.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289142025-03-07T23:12:49.467ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289152025-03-07T23:12:49.472ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
289162025-03-07T23:12:49.472ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
289172025-03-07T23:12:49.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289182025-03-07T23:12:49.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289192025-03-07T23:12:49.473ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289202025-03-07T23:12:49.475ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
289212025-03-07T23:12:49.476ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289222025-03-07T23:12:49.476ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289232025-03-07T23:12:49.476ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289242025-03-07T23:12:49.480ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
289252025-03-07T23:12:49.484ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
289262025-03-07T23:12:49.484ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289272025-03-07T23:12:49.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289282025-03-07T23:12:49.486ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289292025-03-07T23:12:49.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
289302025-03-07T23:12:49.489ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
289312025-03-07T23:12:49.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289322025-03-07T23:12:49.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289332025-03-07T23:12:49.490ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289342025-03-07T23:12:49.492ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
289352025-03-07T23:12:49.492ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
289362025-03-07T23:12:49.493ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
289372025-03-07T23:12:49.493ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
289382025-03-07T23:12:49.494ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
289392025-03-07T23:12:49.497ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
289402025-03-07T23:12:49.497ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 uri = /v1/affinity-groups?project=demo-project
289412025-03-07T23:12:49.498ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database uri = /v1/affinity-groups?project=demo-project
289422025-03-07T23:12:49.498ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289432025-03-07T23:12:49.499ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
289442025-03-07T23:12:49.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database uri = /v1/affinity-groups?project=demo-project
289452025-03-07T23:12:49.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289462025-03-07T23:12:49.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
289472025-03-07T23:12:49.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
289482025-03-07T23:12:49.507ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
289492025-03-07T23:12:49.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database uri = /v1/affinity-groups?project=demo-project
289502025-03-07T23:12:49.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289512025-03-07T23:12:49.508ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
289522025-03-07T23:12:49.517ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
289532025-03-07T23:12:49.517ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database uri = /v1/affinity-groups?project=demo-project
289542025-03-07T23:12:49.517ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289552025-03-07T23:12:49.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
289562025-03-07T23:12:49.521ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
289572025-03-07T23:12:49.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database uri = /v1/affinity-groups?project=demo-project
289582025-03-07T23:12:49.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289592025-03-07T23:12:49.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
289602025-03-07T23:12:49.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
289612025-03-07T23:12:49.542ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/affinity-groups?project=demo-project
289622025-03-07T23:12:49.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 81518 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e1ccba5c-b139-44c3-8d87-c6ee07e3a366 response_code = 404 uri = /v1/affinity-groups?project=demo-project
289632025-03-07T23:12:49.543ZINFOtest_unauthorized (external client test context): client received response status = 404
289642025-03-07T23:12:49.543ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups?project=demo-project
289652025-03-07T23:12:49.543ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289662025-03-07T23:12:49.543ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fd4ce639-3eaf-4b05-b1e0-b60ce34993cd uri = /v1/affinity-groups?project=demo-project
289672025-03-07T23:12:49.543ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fd4ce639-3eaf-4b05-b1e0-b60ce34993cd uri = /v1/affinity-groups?project=demo-project
289682025-03-07T23:12:49.543ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fd4ce639-3eaf-4b05-b1e0-b60ce34993cd uri = /v1/affinity-groups?project=demo-project
289692025-03-07T23:12:49.543ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fd4ce639-3eaf-4b05-b1e0-b60ce34993cd uri = /v1/affinity-groups?project=demo-project
289702025-03-07T23:12:49.543ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 432 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fd4ce639-3eaf-4b05-b1e0-b60ce34993cd response_code = 401 uri = /v1/affinity-groups?project=demo-project
289712025-03-07T23:12:49.544ZINFOtest_unauthorized (external client test context): client received response status = 401
289722025-03-07T23:12:49.544ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups?project=demo-project
289732025-03-07T23:12:49.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289742025-03-07T23:12:49.544ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17e3a4d9-3cdc-4ed7-b227-ef0c5f537939 uri = /v1/affinity-groups?project=demo-project
289752025-03-07T23:12:49.545ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17e3a4d9-3cdc-4ed7-b227-ef0c5f537939 uri = /v1/affinity-groups?project=demo-project
289762025-03-07T23:12:49.545ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17e3a4d9-3cdc-4ed7-b227-ef0c5f537939 uri = /v1/affinity-groups?project=demo-project
289772025-03-07T23:12:49.545ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 272 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 17e3a4d9-3cdc-4ed7-b227-ef0c5f537939 response_code = 401 uri = /v1/affinity-groups?project=demo-project
289782025-03-07T23:12:49.545ZINFOtest_unauthorized (external client test context): client received response status = 401
289792025-03-07T23:12:49.545ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups?project=demo-project
289802025-03-07T23:12:49.545ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289812025-03-07T23:12:49.545ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a1369544-f8ef-498f-aca3-f937764cc69d uri = /v1/affinity-groups?project=demo-project
289822025-03-07T23:12:49.546ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a1369544-f8ef-498f-aca3-f937764cc69d uri = /v1/affinity-groups?project=demo-project
289832025-03-07T23:12:49.547ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2765:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2783:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a1369544-f8ef-498f-aca3-f937764cc69d uri = /v1/affinity-groups?project=demo-project
289842025-03-07T23:12:49.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1515 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a1369544-f8ef-498f-aca3-f937764cc69d response_code = 401 uri = /v1/affinity-groups?project=demo-project
289852025-03-07T23:12:49.547ZINFOtest_unauthorized (external client test context): client received response status = 401
289862025-03-07T23:12:49.547ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups?project=demo-project
289872025-03-07T23:12:49.547ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289882025-03-07T23:12:49.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bbd875ef-ed46-4852-badb-96c6d1a5e2bc uri = /v1/affinity-groups?project=demo-project
289892025-03-07T23:12:49.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bbd875ef-ed46-4852-badb-96c6d1a5e2bc response_code = 405 uri = /v1/affinity-groups?project=demo-project
289902025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client received response status = 405
289912025-03-07T23:12:49.548ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups?project=demo-project
289922025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289932025-03-07T23:12:49.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e88366b-c0dd-4a63-81e3-e50a82e231e6 uri = /v1/affinity-groups?project=demo-project
289942025-03-07T23:12:49.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2e88366b-c0dd-4a63-81e3-e50a82e231e6 response_code = 405 uri = /v1/affinity-groups?project=demo-project
289952025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client received response status = 405
289962025-03-07T23:12:49.548ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups?project=demo-project
289972025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
289982025-03-07T23:12:49.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 53de97f0-2742-47d6-bac0-085c5802d14f uri = /v1/affinity-groups?project=demo-project
289992025-03-07T23:12:49.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 53de97f0-2742-47d6-bac0-085c5802d14f response_code = 405 uri = /v1/affinity-groups?project=demo-project
290002025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client received response status = 405
290012025-03-07T23:12:49.548ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups?project=demo-project
290022025-03-07T23:12:49.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290032025-03-07T23:12:49.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 55bf8278-45f3-42dd-8a7d-2dc27ec3cef5 uri = /v1/affinity-groups?project=demo-project
290042025-03-07T23:12:49.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 55bf8278-45f3-42dd-8a7d-2dc27ec3cef5 response_code = 405 uri = /v1/affinity-groups?project=demo-project
290052025-03-07T23:12:49.549ZINFOtest_unauthorized (external client test context): client received response status = 405
290062025-03-07T23:12:49.550ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups?project=demo-project
290072025-03-07T23:12:49.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290082025-03-07T23:12:49.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a60ed49-999d-44fb-90e6-1d64a0cb847e uri = /v1/affinity-groups?project=demo-project
290092025-03-07T23:12:49.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a60ed49-999d-44fb-90e6-1d64a0cb847e response_code = 405 uri = /v1/affinity-groups?project=demo-project
290102025-03-07T23:12:49.550ZINFOtest_unauthorized (external client test context): client received response status = 405
290112025-03-07T23:12:49.550ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups?project=demo-project
290122025-03-07T23:12:49.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290132025-03-07T23:12:49.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 58168d3a-57a5-47ab-80c1-cc87a73e5565 uri = /v1/affinity-groups?project=demo-project
290142025-03-07T23:12:49.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 58168d3a-57a5-47ab-80c1-cc87a73e5565 response_code = 405 uri = /v1/affinity-groups?project=demo-project
290152025-03-07T23:12:49.550ZINFOtest_unauthorized (external client test context): client received response status = 405
290162025-03-07T23:12:49.550ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups?project=demo-project
290172025-03-07T23:12:49.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290182025-03-07T23:12:49.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a8c0efc-df5f-4057-ad98-47e9461b171e uri = /v1/affinity-groups?project=demo-project
290192025-03-07T23:12:49.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a8c0efc-df5f-4057-ad98-47e9461b171e response_code = 405 uri = /v1/affinity-groups?project=demo-project
290202025-03-07T23:12:49.551ZINFOtest_unauthorized (external client test context): client received response status = 405
290212025-03-07T23:12:49.551ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups?project=demo-project
290222025-03-07T23:12:49.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290232025-03-07T23:12:49.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = df4a0d5c-ba54-4f5e-b121-f60032ed75ab uri = /v1/affinity-groups?project=demo-project
290242025-03-07T23:12:49.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = df4a0d5c-ba54-4f5e-b121-f60032ed75ab response_code = 405 uri = /v1/affinity-groups?project=demo-project
290252025-03-07T23:12:49.552ZINFOtest_unauthorized (external client test context): client received response status = 405
290262025-03-07T23:12:49.552ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups?project=demo-project
290272025-03-07T23:12:49.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups?project=demo-project
290282025-03-07T23:12:49.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 uri = /v1/affinity-groups?project=demo-project
290292025-03-07T23:12:49.553ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 uri = /v1/affinity-groups?project=demo-project
290302025-03-07T23:12:49.554ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
290312025-03-07T23:12:49.554ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290322025-03-07T23:12:49.554ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290332025-03-07T23:12:49.554ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290342025-03-07T23:12:49.558ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290352025-03-07T23:12:49.558ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290362025-03-07T23:12:49.561ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290372025-03-07T23:12:49.563ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
290382025-03-07T23:12:49.563ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
290392025-03-07T23:12:49.563ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290402025-03-07T23:12:49.564ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290412025-03-07T23:12:49.564ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290422025-03-07T23:12:49.567ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
290432025-03-07T23:12:49.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290442025-03-07T23:12:49.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290452025-03-07T23:12:49.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290462025-03-07T23:12:49.576ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
290472025-03-07T23:12:49.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
290482025-03-07T23:12:49.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290492025-03-07T23:12:49.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290502025-03-07T23:12:49.578ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290512025-03-07T23:12:49.578ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
290522025-03-07T23:12:49.578ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290532025-03-07T23:12:49.581ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 04b55c64-84de-4da2-b768-9e1bc0db54c6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290542025-03-07T23:12:49.584ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 04b55c64-84de-4da2-b768-9e1bc0db54c6 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290552025-03-07T23:12:49.584ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 04b55c64-84de-4da2-b768-9e1bc0db54c6 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290562025-03-07T23:12:49.584ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 04b55c64-84de-4da2-b768-9e1bc0db54c6 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290572025-03-07T23:12:49.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
290582025-03-07T23:12:49.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
290592025-03-07T23:12:49.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290602025-03-07T23:12:49.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290612025-03-07T23:12:49.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290622025-03-07T23:12:49.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5189 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 04b55c64-84de-4da2-b768-9e1bc0db54c6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
290632025-03-07T23:12:49.585ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
290642025-03-07T23:12:49.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290652025-03-07T23:12:49.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290662025-03-07T23:12:49.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290672025-03-07T23:12:49.586ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "04b55c64-84de-4da2-b768-9e1bc0db54c6", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:49 GMT"} })
290682025-03-07T23:12:49.588ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290692025-03-07T23:12:49.588ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 3006e661-c57a-4f21-babf-08f9fbe529f8 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290702025-03-07T23:12:49.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290712025-03-07T23:12:49.588ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 3006e661-c57a-4f21-babf-08f9fbe529f8 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290722025-03-07T23:12:49.588ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 3006e661-c57a-4f21-babf-08f9fbe529f8 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290732025-03-07T23:12:49.588ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 3006e661-c57a-4f21-babf-08f9fbe529f8 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290742025-03-07T23:12:49.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290752025-03-07T23:12:49.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
290762025-03-07T23:12:49.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
290772025-03-07T23:12:49.595ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 uri = /v1/affinity-groups?project=demo-project
290782025-03-07T23:12:49.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
290792025-03-07T23:12:49.597ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
290802025-03-07T23:12:49.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
290812025-03-07T23:12:49.599ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12060 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 3006e661-c57a-4f21-babf-08f9fbe529f8 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
290822025-03-07T23:12:49.599ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290832025-03-07T23:12:49.601ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290842025-03-07T23:12:49.601ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290852025-03-07T23:12:49.601ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290862025-03-07T23:12:49.601ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "3006e661-c57a-4f21-babf-08f9fbe529f8", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:49 GMT"} })
290872025-03-07T23:12:49.601ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
290882025-03-07T23:12:49.603ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
290892025-03-07T23:12:49.603ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
290902025-03-07T23:12:49.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
290912025-03-07T23:12:49.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
290922025-03-07T23:12:49.603ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
290932025-03-07T23:12:49.605ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
290942025-03-07T23:12:49.605ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
290952025-03-07T23:12:49.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
290962025-03-07T23:12:49.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
290972025-03-07T23:12:49.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
290982025-03-07T23:12:49.610ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
290992025-03-07T23:12:49.610ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291002025-03-07T23:12:49.610ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291012025-03-07T23:12:49.611ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291022025-03-07T23:12:49.615ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
291032025-03-07T23:12:49.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291042025-03-07T23:12:49.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291052025-03-07T23:12:49.616ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291062025-03-07T23:12:49.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
291072025-03-07T23:12:49.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291082025-03-07T23:12:49.631ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
291092025-03-07T23:12:49.631ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups?project=demo-project
291102025-03-07T23:12:49.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291112025-03-07T23:12:49.632ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291122025-03-07T23:12:49.632ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291132025-03-07T23:12:49.635ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
291142025-03-07T23:12:49.637ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291152025-03-07T23:12:49.637ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291162025-03-07T23:12:49.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291172025-03-07T23:12:49.643ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
291182025-03-07T23:12:49.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291192025-03-07T23:12:49.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291202025-03-07T23:12:49.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291212025-03-07T23:12:49.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
291222025-03-07T23:12:49.662ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291232025-03-07T23:12:49.662ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database uri = /v1/affinity-groups?project=demo-project
291242025-03-07T23:12:49.664ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
291252025-03-07T23:12:49.664ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
291262025-03-07T23:12:49.667ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 115309 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b776964b-2254-4c09-8055-e54202a60546 response_code = 200 uri = /v1/affinity-groups?project=demo-project
291272025-03-07T23:12:49.667ZINFOtest_unauthorized (external client test context): client received response status = 200
291282025-03-07T23:12:49.668ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group?project=demo-project
291292025-03-07T23:12:49.669ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
291302025-03-07T23:12:49.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
291312025-03-07T23:12:49.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291322025-03-07T23:12:49.669ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291332025-03-07T23:12:49.669ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291342025-03-07T23:12:49.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291352025-03-07T23:12:49.669ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291362025-03-07T23:12:49.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291372025-03-07T23:12:49.671ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291382025-03-07T23:12:49.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291392025-03-07T23:12:49.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291402025-03-07T23:12:49.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
291412025-03-07T23:12:49.675ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
291422025-03-07T23:12:49.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291432025-03-07T23:12:49.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291442025-03-07T23:12:49.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291452025-03-07T23:12:49.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
291462025-03-07T23:12:49.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291472025-03-07T23:12:49.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291482025-03-07T23:12:49.679ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291492025-03-07T23:12:49.688ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
291502025-03-07T23:12:49.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
291512025-03-07T23:12:49.693ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291522025-03-07T23:12:49.693ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291532025-03-07T23:12:49.694ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291542025-03-07T23:12:49.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
291552025-03-07T23:12:49.698ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
291562025-03-07T23:12:49.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291572025-03-07T23:12:49.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291582025-03-07T23:12:49.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291592025-03-07T23:12:49.699ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
291602025-03-07T23:12:49.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291612025-03-07T23:12:49.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291622025-03-07T23:12:49.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291632025-03-07T23:12:49.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
291642025-03-07T23:12:49.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
291652025-03-07T23:12:49.708ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291662025-03-07T23:12:49.709ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291672025-03-07T23:12:49.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291682025-03-07T23:12:49.709ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291692025-03-07T23:12:49.712ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291702025-03-07T23:12:49.712ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291712025-03-07T23:12:49.719ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291722025-03-07T23:12:49.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291732025-03-07T23:12:49.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291742025-03-07T23:12:49.722ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291752025-03-07T23:12:49.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291762025-03-07T23:12:49.726ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291772025-03-07T23:12:49.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291782025-03-07T23:12:49.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291792025-03-07T23:12:49.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291802025-03-07T23:12:49.729ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291812025-03-07T23:12:49.729ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291822025-03-07T23:12:49.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291832025-03-07T23:12:49.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291842025-03-07T23:12:49.732ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291852025-03-07T23:12:49.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291862025-03-07T23:12:49.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291872025-03-07T23:12:49.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291882025-03-07T23:12:49.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291892025-03-07T23:12:49.745ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291902025-03-07T23:12:49.746ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 76548 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5c374d1e-537a-44d9-b4d2-13e52dc38030 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291912025-03-07T23:12:49.746ZINFOtest_unauthorized (external client test context): client received response status = 200
291922025-03-07T23:12:49.747ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
291932025-03-07T23:12:49.747ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
291942025-03-07T23:12:49.747ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291952025-03-07T23:12:49.747ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291962025-03-07T23:12:49.747ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
291972025-03-07T23:12:49.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291982025-03-07T23:12:49.747ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291992025-03-07T23:12:49.748ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292002025-03-07T23:12:49.749ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292012025-03-07T23:12:49.749ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292022025-03-07T23:12:49.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292032025-03-07T23:12:49.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
292042025-03-07T23:12:49.752ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
292052025-03-07T23:12:49.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292062025-03-07T23:12:49.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292072025-03-07T23:12:49.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292082025-03-07T23:12:49.755ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
292092025-03-07T23:12:49.755ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292102025-03-07T23:12:49.755ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292112025-03-07T23:12:49.755ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292122025-03-07T23:12:49.758ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
292132025-03-07T23:12:49.762ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
292142025-03-07T23:12:49.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292152025-03-07T23:12:49.762ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292162025-03-07T23:12:49.763ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292172025-03-07T23:12:49.773ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
292182025-03-07T23:12:49.774ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
292192025-03-07T23:12:49.774ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292202025-03-07T23:12:49.774ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292212025-03-07T23:12:49.775ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292222025-03-07T23:12:49.781ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
292232025-03-07T23:12:49.786ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292242025-03-07T23:12:49.787ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292252025-03-07T23:12:49.792ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292262025-03-07T23:12:49.795ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
292272025-03-07T23:12:49.800ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
292282025-03-07T23:12:49.800ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292292025-03-07T23:12:49.800ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292302025-03-07T23:12:49.800ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292312025-03-07T23:12:49.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292322025-03-07T23:12:49.806ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292332025-03-07T23:12:49.807ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292342025-03-07T23:12:49.808ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292352025-03-07T23:12:49.813ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292362025-03-07T23:12:49.814ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292372025-03-07T23:12:49.814ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292382025-03-07T23:12:49.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292392025-03-07T23:12:49.827ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292402025-03-07T23:12:49.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292412025-03-07T23:12:49.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292422025-03-07T23:12:49.829ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292432025-03-07T23:12:49.834ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292442025-03-07T23:12:49.835ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292452025-03-07T23:12:49.836ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292462025-03-07T23:12:49.836ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292472025-03-07T23:12:49.838ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292482025-03-07T23:12:49.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292492025-03-07T23:12:49.840ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292502025-03-07T23:12:49.842ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292512025-03-07T23:12:49.849ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292522025-03-07T23:12:49.875ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292532025-03-07T23:12:49.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 129374 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3841de3b-a4c3-48ed-bef8-c8cba832664b response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292542025-03-07T23:12:49.876ZINFOtest_unauthorized (external client test context): client received response status = 404
292552025-03-07T23:12:49.878ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
292562025-03-07T23:12:49.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
292572025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8175c9b3-2c67-4879-b40a-819c39182c5d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292582025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8175c9b3-2c67-4879-b40a-819c39182c5d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292592025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8175c9b3-2c67-4879-b40a-819c39182c5d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292602025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8175c9b3-2c67-4879-b40a-819c39182c5d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292612025-03-07T23:12:49.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 349 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8175c9b3-2c67-4879-b40a-819c39182c5d response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292622025-03-07T23:12:49.878ZINFOtest_unauthorized (external client test context): client received response status = 401
292632025-03-07T23:12:49.878ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
292642025-03-07T23:12:49.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
292652025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ff7e4884-9ddc-4a7c-8811-7c4930656d80 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292662025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ff7e4884-9ddc-4a7c-8811-7c4930656d80 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292672025-03-07T23:12:49.878ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ff7e4884-9ddc-4a7c-8811-7c4930656d80 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292682025-03-07T23:12:49.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 229 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ff7e4884-9ddc-4a7c-8811-7c4930656d80 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292692025-03-07T23:12:49.880ZINFOtest_unauthorized (external client test context): client received response status = 401
292702025-03-07T23:12:49.880ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
292712025-03-07T23:12:49.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
292722025-03-07T23:12:49.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c29d880-e309-440f-a2ea-792382c27cc8 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292732025-03-07T23:12:49.880ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c29d880-e309-440f-a2ea-792382c27cc8 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292742025-03-07T23:12:49.881ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2555:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2574:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c29d880-e309-440f-a2ea-792382c27cc8 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292752025-03-07T23:12:49.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2678 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c29d880-e309-440f-a2ea-792382c27cc8 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292762025-03-07T23:12:49.890ZINFOtest_unauthorized (external client test context): client received response status = 401
292772025-03-07T23:12:49.892ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
292782025-03-07T23:12:49.893ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
292792025-03-07T23:12:49.893ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292802025-03-07T23:12:49.893ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292812025-03-07T23:12:49.893ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
292822025-03-07T23:12:49.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292832025-03-07T23:12:49.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292842025-03-07T23:12:49.895ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292852025-03-07T23:12:49.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292862025-03-07T23:12:49.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292872025-03-07T23:12:49.899ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292882025-03-07T23:12:49.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
292892025-03-07T23:12:49.916ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
292902025-03-07T23:12:49.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292912025-03-07T23:12:49.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292922025-03-07T23:12:49.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292932025-03-07T23:12:49.916ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
292942025-03-07T23:12:49.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
292952025-03-07T23:12:49.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
292962025-03-07T23:12:49.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
292972025-03-07T23:12:49.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
292982025-03-07T23:12:49.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
292992025-03-07T23:12:49.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293002025-03-07T23:12:49.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293012025-03-07T23:12:49.928ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293022025-03-07T23:12:49.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
293032025-03-07T23:12:49.933ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
293042025-03-07T23:12:49.933ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293052025-03-07T23:12:49.934ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293062025-03-07T23:12:49.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293072025-03-07T23:12:49.943ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
293082025-03-07T23:12:49.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293092025-03-07T23:12:49.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293102025-03-07T23:12:49.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293112025-03-07T23:12:49.949ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
293122025-03-07T23:12:49.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
293132025-03-07T23:12:49.958ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293142025-03-07T23:12:49.958ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293152025-03-07T23:12:49.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293162025-03-07T23:12:49.958ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293172025-03-07T23:12:49.964ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293182025-03-07T23:12:49.964ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293192025-03-07T23:12:49.964ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293202025-03-07T23:12:49.965ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293212025-03-07T23:12:49.966ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293222025-03-07T23:12:49.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293232025-03-07T23:12:49.968ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293242025-03-07T23:12:49.969ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293252025-03-07T23:12:49.969ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293262025-03-07T23:12:49.969ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293272025-03-07T23:12:49.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293282025-03-07T23:12:49.972ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293292025-03-07T23:12:49.973ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293302025-03-07T23:12:49.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293312025-03-07T23:12:49.973ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293322025-03-07T23:12:49.977ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293332025-03-07T23:12:49.978ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293342025-03-07T23:12:49.978ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293352025-03-07T23:12:49.978ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293362025-03-07T23:12:49.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293372025-03-07T23:12:50.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293382025-03-07T23:12:50.005ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 112231 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b244d8cb-1484-439f-b788-4e2a0d3bf0af response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293392025-03-07T23:12:50.006ZINFOtest_unauthorized (external client test context): client received response status = 404
293402025-03-07T23:12:50.006ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293412025-03-07T23:12:50.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293422025-03-07T23:12:50.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3f9f0935-7bfb-47c4-a579-1e63971e813d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293432025-03-07T23:12:50.007ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3f9f0935-7bfb-47c4-a579-1e63971e813d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293442025-03-07T23:12:50.007ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3f9f0935-7bfb-47c4-a579-1e63971e813d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293452025-03-07T23:12:50.008ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3f9f0935-7bfb-47c4-a579-1e63971e813d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293462025-03-07T23:12:50.008ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 914 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3f9f0935-7bfb-47c4-a579-1e63971e813d response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293472025-03-07T23:12:50.008ZINFOtest_unauthorized (external client test context): client received response status = 401
293482025-03-07T23:12:50.009ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293492025-03-07T23:12:50.009ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293502025-03-07T23:12:50.009ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cf598990-7142-4384-8ec8-9ccb34a30626 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293512025-03-07T23:12:50.009ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cf598990-7142-4384-8ec8-9ccb34a30626 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293522025-03-07T23:12:50.009ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cf598990-7142-4384-8ec8-9ccb34a30626 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293532025-03-07T23:12:50.009ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 282 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cf598990-7142-4384-8ec8-9ccb34a30626 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293542025-03-07T23:12:50.009ZINFOtest_unauthorized (external client test context): client received response status = 401
293552025-03-07T23:12:50.009ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293562025-03-07T23:12:50.009ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293572025-03-07T23:12:50.009ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8e245d64-34f9-47be-9a4f-603bf70ffedd uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293582025-03-07T23:12:50.015ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8e245d64-34f9-47be-9a4f-603bf70ffedd uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293592025-03-07T23:12:50.016ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2795:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2815:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8e245d64-34f9-47be-9a4f-603bf70ffedd uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293602025-03-07T23:12:50.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1135 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8e245d64-34f9-47be-9a4f-603bf70ffedd response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293612025-03-07T23:12:50.016ZINFOtest_unauthorized (external client test context): client received response status = 401
293622025-03-07T23:12:50.016ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293632025-03-07T23:12:50.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293642025-03-07T23:12:50.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5aa8862-1ad2-440c-99cd-2cb7bd3b784d uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293652025-03-07T23:12:50.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f5aa8862-1ad2-440c-99cd-2cb7bd3b784d response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293662025-03-07T23:12:50.016ZINFOtest_unauthorized (external client test context): client received response status = 405
293672025-03-07T23:12:50.016ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293682025-03-07T23:12:50.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293692025-03-07T23:12:50.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ebaff1e1-bf25-4962-8e5d-bda4ccd5bebc uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293702025-03-07T23:12:50.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ebaff1e1-bf25-4962-8e5d-bda4ccd5bebc response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293712025-03-07T23:12:50.017ZINFOtest_unauthorized (external client test context): client received response status = 405
293722025-03-07T23:12:50.017ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293732025-03-07T23:12:50.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293742025-03-07T23:12:50.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96e9f30f-b577-4d99-b188-17b0832ebf1f uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293752025-03-07T23:12:50.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96e9f30f-b577-4d99-b188-17b0832ebf1f response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293762025-03-07T23:12:50.017ZINFOtest_unauthorized (external client test context): client received response status = 405
293772025-03-07T23:12:50.017ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293782025-03-07T23:12:50.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293792025-03-07T23:12:50.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1af88b5d-afdc-44f0-952a-62072cc3276c uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293802025-03-07T23:12:50.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 1af88b5d-afdc-44f0-952a-62072cc3276c response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293812025-03-07T23:12:50.017ZINFOtest_unauthorized (external client test context): client received response status = 405
293822025-03-07T23:12:50.017ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
293832025-03-07T23:12:50.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
293842025-03-07T23:12:50.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293852025-03-07T23:12:50.019ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293862025-03-07T23:12:50.019ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
293872025-03-07T23:12:50.019ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293882025-03-07T23:12:50.019ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293892025-03-07T23:12:50.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293902025-03-07T23:12:50.026ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293912025-03-07T23:12:50.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293922025-03-07T23:12:50.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293932025-03-07T23:12:50.032ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
293942025-03-07T23:12:50.032ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
293952025-03-07T23:12:50.032ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293962025-03-07T23:12:50.032ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293972025-03-07T23:12:50.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293982025-03-07T23:12:50.035ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
293992025-03-07T23:12:50.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294002025-03-07T23:12:50.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294012025-03-07T23:12:50.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294022025-03-07T23:12:50.041ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
294032025-03-07T23:12:50.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
294042025-03-07T23:12:50.045ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294052025-03-07T23:12:50.045ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294062025-03-07T23:12:50.047ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294072025-03-07T23:12:50.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
294082025-03-07T23:12:50.049ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
294092025-03-07T23:12:50.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294102025-03-07T23:12:50.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294112025-03-07T23:12:50.050ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294122025-03-07T23:12:50.052ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
294132025-03-07T23:12:50.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294142025-03-07T23:12:50.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294152025-03-07T23:12:50.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294162025-03-07T23:12:50.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
294172025-03-07T23:12:50.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
294182025-03-07T23:12:50.063ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294192025-03-07T23:12:50.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294202025-03-07T23:12:50.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294212025-03-07T23:12:50.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294222025-03-07T23:12:50.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294232025-03-07T23:12:50.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294242025-03-07T23:12:50.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294252025-03-07T23:12:50.099ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294262025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294272025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294282025-03-07T23:12:50.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294292025-03-07T23:12:50.104ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294302025-03-07T23:12:50.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294312025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294322025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294332025-03-07T23:12:50.104ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294342025-03-07T23:12:50.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294352025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294362025-03-07T23:12:50.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294372025-03-07T23:12:50.105ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294382025-03-07T23:12:50.105ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294392025-03-07T23:12:50.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294402025-03-07T23:12:50.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294412025-03-07T23:12:50.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294422025-03-07T23:12:50.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294432025-03-07T23:12:50.111ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 96379 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ff90efa1-78c0-4815-b2bf-4f34c3abcda3 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294442025-03-07T23:12:50.111ZINFOtest_unauthorized (external client test context): client received response status = 404
294452025-03-07T23:12:50.112ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294462025-03-07T23:12:50.112ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294472025-03-07T23:12:50.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c2e1c65-08bf-4eb7-9516-441c1606c3b0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294482025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c2e1c65-08bf-4eb7-9516-441c1606c3b0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294492025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c2e1c65-08bf-4eb7-9516-441c1606c3b0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294502025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c2e1c65-08bf-4eb7-9516-441c1606c3b0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294512025-03-07T23:12:50.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 409 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8c2e1c65-08bf-4eb7-9516-441c1606c3b0 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294522025-03-07T23:12:50.113ZINFOtest_unauthorized (external client test context): client received response status = 401
294532025-03-07T23:12:50.113ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294542025-03-07T23:12:50.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294552025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43f1e6c8-ebcc-4e98-8696-a5e76ee4ed25 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294562025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43f1e6c8-ebcc-4e98-8696-a5e76ee4ed25 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294572025-03-07T23:12:50.113ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43f1e6c8-ebcc-4e98-8696-a5e76ee4ed25 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294582025-03-07T23:12:50.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 226 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 43f1e6c8-ebcc-4e98-8696-a5e76ee4ed25 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294592025-03-07T23:12:50.114ZINFOtest_unauthorized (external client test context): client received response status = 401
294602025-03-07T23:12:50.114ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294612025-03-07T23:12:50.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294622025-03-07T23:12:50.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5ed0ae4e-4454-48a5-8ee2-c79e874fd138 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294632025-03-07T23:12:50.114ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5ed0ae4e-4454-48a5-8ee2-c79e874fd138 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294642025-03-07T23:12:50.116ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2826:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2843:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5ed0ae4e-4454-48a5-8ee2-c79e874fd138 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294652025-03-07T23:12:50.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 972 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5ed0ae4e-4454-48a5-8ee2-c79e874fd138 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294662025-03-07T23:12:50.116ZINFOtest_unauthorized (external client test context): client received response status = 401
294672025-03-07T23:12:50.116ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294682025-03-07T23:12:50.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294692025-03-07T23:12:50.116ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f801fcd7-d891-4a63-a684-a148c3161a20 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294702025-03-07T23:12:50.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f801fcd7-d891-4a63-a684-a148c3161a20 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294712025-03-07T23:12:50.116ZINFOtest_unauthorized (external client test context): client received response status = 405
294722025-03-07T23:12:50.117ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294732025-03-07T23:12:50.117ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294742025-03-07T23:12:50.117ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c4e3dd6c-d8c1-47fd-9cf2-cc3880e2e0c0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294752025-03-07T23:12:50.117ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c4e3dd6c-d8c1-47fd-9cf2-cc3880e2e0c0 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294762025-03-07T23:12:50.117ZINFOtest_unauthorized (external client test context): client received response status = 405
294772025-03-07T23:12:50.123ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294782025-03-07T23:12:50.123ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294792025-03-07T23:12:50.123ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dec03e08-1755-4cb8-9fb4-7aae45eadd52 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294802025-03-07T23:12:50.123ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dec03e08-1755-4cb8-9fb4-7aae45eadd52 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294812025-03-07T23:12:50.123ZINFOtest_unauthorized (external client test context): client received response status = 405
294822025-03-07T23:12:50.123ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294832025-03-07T23:12:50.123ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294842025-03-07T23:12:50.123ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 59f3f87f-eed3-4ac8-988b-c3ad2109b7ad uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294852025-03-07T23:12:50.124ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 59f3f87f-eed3-4ac8-988b-c3ad2109b7ad response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294862025-03-07T23:12:50.124ZINFOtest_unauthorized (external client test context): client received response status = 405
294872025-03-07T23:12:50.124ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group?project=demo-project
294882025-03-07T23:12:50.124ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group?project=demo-project
294892025-03-07T23:12:50.124ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294902025-03-07T23:12:50.126ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294912025-03-07T23:12:50.126ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
294922025-03-07T23:12:50.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294932025-03-07T23:12:50.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294942025-03-07T23:12:50.126ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294952025-03-07T23:12:50.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294962025-03-07T23:12:50.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294972025-03-07T23:12:50.126ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294982025-03-07T23:12:50.132ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
294992025-03-07T23:12:50.134ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295002025-03-07T23:12:50.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295012025-03-07T23:12:50.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295022025-03-07T23:12:50.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295032025-03-07T23:12:50.134ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295042025-03-07T23:12:50.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295052025-03-07T23:12:50.134ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295062025-03-07T23:12:50.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295072025-03-07T23:12:50.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295082025-03-07T23:12:50.137ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
295092025-03-07T23:12:50.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295102025-03-07T23:12:50.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295112025-03-07T23:12:50.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295122025-03-07T23:12:50.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
295132025-03-07T23:12:50.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295142025-03-07T23:12:50.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295152025-03-07T23:12:50.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295162025-03-07T23:12:50.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295172025-03-07T23:12:50.145ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295182025-03-07T23:12:50.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295192025-03-07T23:12:50.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295202025-03-07T23:12:50.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295212025-03-07T23:12:50.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295222025-03-07T23:12:50.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
295232025-03-07T23:12:50.149ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295242025-03-07T23:12:50.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295252025-03-07T23:12:50.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295262025-03-07T23:12:50.150ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295272025-03-07T23:12:50.153ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295282025-03-07T23:12:50.153ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295292025-03-07T23:12:50.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295302025-03-07T23:12:50.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295312025-03-07T23:12:50.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295322025-03-07T23:12:50.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295332025-03-07T23:12:50.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295342025-03-07T23:12:50.161ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295352025-03-07T23:12:50.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295362025-03-07T23:12:50.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295372025-03-07T23:12:50.163ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295382025-03-07T23:12:50.163ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295392025-03-07T23:12:50.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295402025-03-07T23:12:50.167ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295412025-03-07T23:12:50.167ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295422025-03-07T23:12:50.167ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295432025-03-07T23:12:50.167ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295442025-03-07T23:12:50.167ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295452025-03-07T23:12:50.168ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295462025-03-07T23:12:50.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295472025-03-07T23:12:50.181ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295482025-03-07T23:12:50.181ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 62970 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e76eba35-d20a-4409-8af8-234732c66a34 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
295492025-03-07T23:12:50.182ZINFOtest_unauthorized (external client test context): client received response status = 200
295502025-03-07T23:12:50.183ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295512025-03-07T23:12:50.183ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295522025-03-07T23:12:50.183ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
295532025-03-07T23:12:50.183ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295542025-03-07T23:12:50.183ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295552025-03-07T23:12:50.183ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295562025-03-07T23:12:50.183ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295572025-03-07T23:12:50.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295582025-03-07T23:12:50.184ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295592025-03-07T23:12:50.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295602025-03-07T23:12:50.188ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295612025-03-07T23:12:50.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295622025-03-07T23:12:50.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
295632025-03-07T23:12:50.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295642025-03-07T23:12:50.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295652025-03-07T23:12:50.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295662025-03-07T23:12:50.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295672025-03-07T23:12:50.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295682025-03-07T23:12:50.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295692025-03-07T23:12:50.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295702025-03-07T23:12:50.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295712025-03-07T23:12:50.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295722025-03-07T23:12:50.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
295732025-03-07T23:12:50.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295742025-03-07T23:12:50.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295752025-03-07T23:12:50.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295762025-03-07T23:12:50.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
295772025-03-07T23:12:50.206ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295782025-03-07T23:12:50.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295792025-03-07T23:12:50.206ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295802025-03-07T23:12:50.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295812025-03-07T23:12:50.208ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295822025-03-07T23:12:50.209ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295832025-03-07T23:12:50.209ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295842025-03-07T23:12:50.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295852025-03-07T23:12:50.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295862025-03-07T23:12:50.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
295872025-03-07T23:12:50.214ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295882025-03-07T23:12:50.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295892025-03-07T23:12:50.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295902025-03-07T23:12:50.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295912025-03-07T23:12:50.218ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
295922025-03-07T23:12:50.218ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
295932025-03-07T23:12:50.218ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
295942025-03-07T23:12:50.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
295952025-03-07T23:12:50.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295962025-03-07T23:12:50.223ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295972025-03-07T23:12:50.223ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295982025-03-07T23:12:50.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
295992025-03-07T23:12:50.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296002025-03-07T23:12:50.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296012025-03-07T23:12:50.227ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
296022025-03-07T23:12:50.227ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
296032025-03-07T23:12:50.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296042025-03-07T23:12:50.231ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296052025-03-07T23:12:50.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296062025-03-07T23:12:50.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296072025-03-07T23:12:50.232ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296082025-03-07T23:12:50.234ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
296092025-03-07T23:12:50.236ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
296102025-03-07T23:12:50.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296112025-03-07T23:12:50.239ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296122025-03-07T23:12:50.239ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296132025-03-07T23:12:50.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296142025-03-07T23:12:50.246ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296152025-03-07T23:12:50.246ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296162025-03-07T23:12:50.246ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296172025-03-07T23:12:50.254ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296182025-03-07T23:12:50.260ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296192025-03-07T23:12:50.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296202025-03-07T23:12:50.270ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296212025-03-07T23:12:50.271ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296222025-03-07T23:12:50.272ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296232025-03-07T23:12:50.272ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296242025-03-07T23:12:50.272ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296252025-03-07T23:12:50.274ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296262025-03-07T23:12:50.276ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296272025-03-07T23:12:50.276ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296282025-03-07T23:12:50.278ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296292025-03-07T23:12:50.278ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296302025-03-07T23:12:50.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296312025-03-07T23:12:50.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296322025-03-07T23:12:50.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296332025-03-07T23:12:50.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296342025-03-07T23:12:50.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296352025-03-07T23:12:50.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296362025-03-07T23:12:50.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296372025-03-07T23:12:50.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296382025-03-07T23:12:50.304ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 121261 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c65965d2-f95e-4612-aa27-667c78a81824 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296392025-03-07T23:12:50.306ZINFOtest_unauthorized (external client test context): client received response status = 200
296402025-03-07T23:12:50.306ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296412025-03-07T23:12:50.306ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
296422025-03-07T23:12:50.306ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296432025-03-07T23:12:50.306ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296442025-03-07T23:12:50.306ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296452025-03-07T23:12:50.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296462025-03-07T23:12:50.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296472025-03-07T23:12:50.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296482025-03-07T23:12:50.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296492025-03-07T23:12:50.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296502025-03-07T23:12:50.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296512025-03-07T23:12:50.311ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
296522025-03-07T23:12:50.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
296532025-03-07T23:12:50.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296542025-03-07T23:12:50.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296552025-03-07T23:12:50.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296562025-03-07T23:12:50.314ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
296572025-03-07T23:12:50.315ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296582025-03-07T23:12:50.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296592025-03-07T23:12:50.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296602025-03-07T23:12:50.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
296612025-03-07T23:12:50.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
296622025-03-07T23:12:50.322ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296632025-03-07T23:12:50.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296642025-03-07T23:12:50.323ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296652025-03-07T23:12:50.324ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
296662025-03-07T23:12:50.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
296672025-03-07T23:12:50.328ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
296682025-03-07T23:12:50.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296692025-03-07T23:12:50.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296702025-03-07T23:12:50.329ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296712025-03-07T23:12:50.332ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
296722025-03-07T23:12:50.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296732025-03-07T23:12:50.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296742025-03-07T23:12:50.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296752025-03-07T23:12:50.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
296762025-03-07T23:12:50.342ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
296772025-03-07T23:12:50.342ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296782025-03-07T23:12:50.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296792025-03-07T23:12:50.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296802025-03-07T23:12:50.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296812025-03-07T23:12:50.348ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
296822025-03-07T23:12:50.348ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
296832025-03-07T23:12:50.348ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
296842025-03-07T23:12:50.348ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
296852025-03-07T23:12:50.348ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
296862025-03-07T23:12:50.348ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
296872025-03-07T23:12:50.349ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
296882025-03-07T23:12:50.349ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
296892025-03-07T23:12:50.349ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
296902025-03-07T23:12:50.359ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296912025-03-07T23:12:50.359ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296922025-03-07T23:12:50.361ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296932025-03-07T23:12:50.365ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296942025-03-07T23:12:50.366ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296952025-03-07T23:12:50.367ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296962025-03-07T23:12:50.373ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296972025-03-07T23:12:50.373ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296982025-03-07T23:12:50.373ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
296992025-03-07T23:12:50.374ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297002025-03-07T23:12:50.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297012025-03-07T23:12:50.385ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297022025-03-07T23:12:50.388ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297032025-03-07T23:12:50.388ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297042025-03-07T23:12:50.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297052025-03-07T23:12:50.400ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297062025-03-07T23:12:50.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297072025-03-07T23:12:50.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297082025-03-07T23:12:50.400ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297092025-03-07T23:12:50.406ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297102025-03-07T23:12:50.461ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297112025-03-07T23:12:50.462ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 156604 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 103b7da1-1bb3-498a-bbec-9f8f4ceda52a response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297122025-03-07T23:12:50.463ZINFOtest_unauthorized (external client test context): client received response status = 404
297132025-03-07T23:12:50.464ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297142025-03-07T23:12:50.464ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297152025-03-07T23:12:50.465ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea0445e2-aae8-4892-8f66-dd478ada7cb9 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297162025-03-07T23:12:50.465ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea0445e2-aae8-4892-8f66-dd478ada7cb9 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297172025-03-07T23:12:50.465ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea0445e2-aae8-4892-8f66-dd478ada7cb9 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297182025-03-07T23:12:50.465ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea0445e2-aae8-4892-8f66-dd478ada7cb9 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297192025-03-07T23:12:50.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1331 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ea0445e2-aae8-4892-8f66-dd478ada7cb9 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297202025-03-07T23:12:50.474ZINFOtest_unauthorized (external client test context): client received response status = 401
297212025-03-07T23:12:50.474ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297222025-03-07T23:12:50.474ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297232025-03-07T23:12:50.474ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647d9fb-8dde-4c1d-a0e5-768f4678c640 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297242025-03-07T23:12:50.474ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647d9fb-8dde-4c1d-a0e5-768f4678c640 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297252025-03-07T23:12:50.474ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647d9fb-8dde-4c1d-a0e5-768f4678c640 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297262025-03-07T23:12:50.474ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 206 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4647d9fb-8dde-4c1d-a0e5-768f4678c640 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297272025-03-07T23:12:50.474ZINFOtest_unauthorized (external client test context): client received response status = 401
297282025-03-07T23:12:50.474ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297292025-03-07T23:12:50.474ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297302025-03-07T23:12:50.475ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99a92348-6ece-44fe-bf0e-2b11e6b2bbc3 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297312025-03-07T23:12:50.475ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99a92348-6ece-44fe-bf0e-2b11e6b2bbc3 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297322025-03-07T23:12:50.475ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2588:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2619:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99a92348-6ece-44fe-bf0e-2b11e6b2bbc3 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297332025-03-07T23:12:50.475ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 900 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 99a92348-6ece-44fe-bf0e-2b11e6b2bbc3 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297342025-03-07T23:12:50.475ZINFOtest_unauthorized (external client test context): client received response status = 401
297352025-03-07T23:12:50.475ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297362025-03-07T23:12:50.475ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297372025-03-07T23:12:50.475ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 897e4905-29dc-4196-ac33-690fbc4eae31 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297382025-03-07T23:12:50.475ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 897e4905-29dc-4196-ac33-690fbc4eae31 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297392025-03-07T23:12:50.475ZINFOtest_unauthorized (external client test context): client received response status = 405
297402025-03-07T23:12:50.475ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297412025-03-07T23:12:50.475ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297422025-03-07T23:12:50.476ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 790f3900-dcc3-4a2d-a5b8-49111d57b8a9 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297432025-03-07T23:12:50.476ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 790f3900-dcc3-4a2d-a5b8-49111d57b8a9 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297442025-03-07T23:12:50.476ZINFOtest_unauthorized (external client test context): client received response status = 405
297452025-03-07T23:12:50.476ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297462025-03-07T23:12:50.476ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297472025-03-07T23:12:50.476ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2a4f3537-7b75-4f32-8432-8c2dbe18a143 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297482025-03-07T23:12:50.476ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 2a4f3537-7b75-4f32-8432-8c2dbe18a143 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297492025-03-07T23:12:50.476ZINFOtest_unauthorized (external client test context): client received response status = 405
297502025-03-07T23:12:50.476ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297512025-03-07T23:12:50.476ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297522025-03-07T23:12:50.476ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 198fb083-12cb-4afe-960a-aa1ab5dbf5db uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297532025-03-07T23:12:50.476ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 198fb083-12cb-4afe-960a-aa1ab5dbf5db response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297542025-03-07T23:12:50.476ZINFOtest_unauthorized (external client test context): client received response status = 405
297552025-03-07T23:12:50.477ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297562025-03-07T23:12:50.477ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297572025-03-07T23:12:50.478ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e603d179-ca2f-48c5-b01c-7dc69ddc4c8b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297582025-03-07T23:12:50.478ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e603d179-ca2f-48c5-b01c-7dc69ddc4c8b response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297592025-03-07T23:12:50.478ZINFOtest_unauthorized (external client test context): client received response status = 405
297602025-03-07T23:12:50.478ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297612025-03-07T23:12:50.478ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297622025-03-07T23:12:50.478ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e04dd71-d255-4e6c-a79b-a7912899c109 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297632025-03-07T23:12:50.478ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0e04dd71-d255-4e6c-a79b-a7912899c109 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297642025-03-07T23:12:50.478ZINFOtest_unauthorized (external client test context): client received response status = 405
297652025-03-07T23:12:50.478ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297662025-03-07T23:12:50.478ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297672025-03-07T23:12:50.478ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d0e216c-d77a-40d6-bf04-df628dc1a811 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297682025-03-07T23:12:50.478ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8d0e216c-d77a-40d6-bf04-df628dc1a811 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297692025-03-07T23:12:50.478ZINFOtest_unauthorized (external client test context): client received response status = 405
297702025-03-07T23:12:50.479ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297712025-03-07T23:12:50.479ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297722025-03-07T23:12:50.479ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e73da2be-f5b7-42f1-8d76-92c245d1c458 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297732025-03-07T23:12:50.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e73da2be-f5b7-42f1-8d76-92c245d1c458 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297742025-03-07T23:12:50.480ZINFOtest_unauthorized (external client test context): client received response status = 405
297752025-03-07T23:12:50.480ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297762025-03-07T23:12:50.480ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297772025-03-07T23:12:50.480ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8cd2409c-9006-42bb-b81c-4b2257f9e799 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297782025-03-07T23:12:50.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8cd2409c-9006-42bb-b81c-4b2257f9e799 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297792025-03-07T23:12:50.480ZINFOtest_unauthorized (external client test context): client received response status = 405
297802025-03-07T23:12:50.480ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297812025-03-07T23:12:50.480ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297822025-03-07T23:12:50.480ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 53eee953-6c41-4daa-9d9e-4db7f97154c7 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297832025-03-07T23:12:50.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 53eee953-6c41-4daa-9d9e-4db7f97154c7 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297842025-03-07T23:12:50.481ZINFOtest_unauthorized (external client test context): client received response status = 405
297852025-03-07T23:12:50.482ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297862025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297872025-03-07T23:12:50.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fa72c009-dd85-4c5f-a6dd-fd63cc577c62 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297882025-03-07T23:12:50.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fa72c009-dd85-4c5f-a6dd-fd63cc577c62 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297892025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client received response status = 405
297902025-03-07T23:12:50.482ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297912025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297922025-03-07T23:12:50.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a50b57c-5be8-4bdd-a235-5afa06143255 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297932025-03-07T23:12:50.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a50b57c-5be8-4bdd-a235-5afa06143255 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297942025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client received response status = 405
297952025-03-07T23:12:50.482ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297962025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
297972025-03-07T23:12:50.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c8f5bf17-694b-4928-b15c-86bf365d38d1 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297982025-03-07T23:12:50.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c8f5bf17-694b-4928-b15c-86bf365d38d1 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
297992025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client received response status = 405
298002025-03-07T23:12:50.482ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298012025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
298022025-03-07T23:12:50.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 90068594-4446-4f4c-9978-b4f6692e74ca uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298032025-03-07T23:12:50.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 90068594-4446-4f4c-9978-b4f6692e74ca response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298042025-03-07T23:12:50.482ZINFOtest_unauthorized (external client test context): client received response status = 405
298052025-03-07T23:12:50.483ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298062025-03-07T23:12:50.483ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
298072025-03-07T23:12:50.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9346571a-cdaf-4fda-827d-685d46c36fa6 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298082025-03-07T23:12:50.483ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9346571a-cdaf-4fda-827d-685d46c36fa6 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298092025-03-07T23:12:50.483ZINFOtest_unauthorized (external client test context): client received response status = 405
298102025-03-07T23:12:50.483ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298112025-03-07T23:12:50.483ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
298122025-03-07T23:12:50.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a945d3e9-4692-4380-9f72-bddf94d20383 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298132025-03-07T23:12:50.483ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a945d3e9-4692-4380-9f72-bddf94d20383 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298142025-03-07T23:12:50.483ZINFOtest_unauthorized (external client test context): client received response status = 405
298152025-03-07T23:12:50.483ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298162025-03-07T23:12:50.483ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members?project=demo-project
298172025-03-07T23:12:50.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298182025-03-07T23:12:50.483ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298192025-03-07T23:12:50.483ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298202025-03-07T23:12:50.483ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298212025-03-07T23:12:50.483ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298222025-03-07T23:12:50.484ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298232025-03-07T23:12:50.486ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298242025-03-07T23:12:50.486ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298252025-03-07T23:12:50.487ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298262025-03-07T23:12:50.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
298272025-03-07T23:12:50.489ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
298282025-03-07T23:12:50.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298292025-03-07T23:12:50.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298302025-03-07T23:12:50.490ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298312025-03-07T23:12:50.497ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
298322025-03-07T23:12:50.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298332025-03-07T23:12:50.499ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298342025-03-07T23:12:50.499ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298352025-03-07T23:12:50.506ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
298362025-03-07T23:12:50.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
298372025-03-07T23:12:50.512ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298382025-03-07T23:12:50.512ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298392025-03-07T23:12:50.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298402025-03-07T23:12:50.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
298412025-03-07T23:12:50.518ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
298422025-03-07T23:12:50.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298432025-03-07T23:12:50.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298442025-03-07T23:12:50.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298452025-03-07T23:12:50.522ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
298462025-03-07T23:12:50.522ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298472025-03-07T23:12:50.523ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298482025-03-07T23:12:50.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298492025-03-07T23:12:50.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
298502025-03-07T23:12:50.534ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
298512025-03-07T23:12:50.536ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298522025-03-07T23:12:50.536ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298532025-03-07T23:12:50.536ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298542025-03-07T23:12:50.536ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298552025-03-07T23:12:50.551ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298562025-03-07T23:12:50.551ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298572025-03-07T23:12:50.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298582025-03-07T23:12:50.564ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298592025-03-07T23:12:50.564ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298602025-03-07T23:12:50.566ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298612025-03-07T23:12:50.568ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298622025-03-07T23:12:50.568ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298632025-03-07T23:12:50.568ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298642025-03-07T23:12:50.568ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298652025-03-07T23:12:50.568ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298662025-03-07T23:12:50.576ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298672025-03-07T23:12:50.576ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298682025-03-07T23:12:50.576ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298692025-03-07T23:12:50.576ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298702025-03-07T23:12:50.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298712025-03-07T23:12:50.589ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298722025-03-07T23:12:50.590ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298732025-03-07T23:12:50.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298742025-03-07T23:12:50.590ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298752025-03-07T23:12:50.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298762025-03-07T23:12:50.592ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298772025-03-07T23:12:50.593ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298782025-03-07T23:12:50.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298792025-03-07T23:12:50.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
298802025-03-07T23:12:50.597ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298812025-03-07T23:12:50.621ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298822025-03-07T23:12:50.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298832025-03-07T23:12:50.623ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298842025-03-07T23:12:50.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298852025-03-07T23:12:50.623ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298862025-03-07T23:12:50.623ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298872025-03-07T23:12:50.626ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298882025-03-07T23:12:50.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298892025-03-07T23:12:50.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298902025-03-07T23:12:50.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298912025-03-07T23:12:50.632ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298922025-03-07T23:12:50.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298932025-03-07T23:12:50.637ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298942025-03-07T23:12:50.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298952025-03-07T23:12:50.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298962025-03-07T23:12:50.656ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298972025-03-07T23:12:50.656ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298982025-03-07T23:12:50.656ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
298992025-03-07T23:12:50.657ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
299002025-03-07T23:12:50.662ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 180763 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ba7a5fb-3e37-4e6d-87dd-761b52585a91 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
299012025-03-07T23:12:50.663ZINFOtest_unauthorized (external client test context): client received response status = 200
299022025-03-07T23:12:50.663ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299032025-03-07T23:12:50.663ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299042025-03-07T23:12:50.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299052025-03-07T23:12:50.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299062025-03-07T23:12:50.664ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299072025-03-07T23:12:50.664ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299082025-03-07T23:12:50.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299092025-03-07T23:12:50.665ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299102025-03-07T23:12:50.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299112025-03-07T23:12:50.667ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299122025-03-07T23:12:50.668ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299132025-03-07T23:12:50.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299142025-03-07T23:12:50.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
299152025-03-07T23:12:50.676ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
299162025-03-07T23:12:50.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299172025-03-07T23:12:50.677ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299182025-03-07T23:12:50.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299192025-03-07T23:12:50.680ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
299202025-03-07T23:12:50.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299212025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299222025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299232025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
299242025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
299252025-03-07T23:12:50.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299262025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299272025-03-07T23:12:50.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299282025-03-07T23:12:50.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
299292025-03-07T23:12:50.691ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
299302025-03-07T23:12:50.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299312025-03-07T23:12:50.691ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299322025-03-07T23:12:50.691ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299332025-03-07T23:12:50.693ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
299342025-03-07T23:12:50.693ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299352025-03-07T23:12:50.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299362025-03-07T23:12:50.694ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299372025-03-07T23:12:50.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
299382025-03-07T23:12:50.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
299392025-03-07T23:12:50.699ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299402025-03-07T23:12:50.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299412025-03-07T23:12:50.700ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299422025-03-07T23:12:50.700ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299432025-03-07T23:12:50.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299442025-03-07T23:12:50.703ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299452025-03-07T23:12:50.703ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299462025-03-07T23:12:50.704ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299472025-03-07T23:12:50.704ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299482025-03-07T23:12:50.705ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299492025-03-07T23:12:50.710ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299502025-03-07T23:12:50.710ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299512025-03-07T23:12:50.711ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299522025-03-07T23:12:50.711ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299532025-03-07T23:12:50.712ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299542025-03-07T23:12:50.716ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299552025-03-07T23:12:50.716ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299562025-03-07T23:12:50.718ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299572025-03-07T23:12:50.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299582025-03-07T23:12:50.721ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299592025-03-07T23:12:50.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299602025-03-07T23:12:50.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299612025-03-07T23:12:50.722ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299622025-03-07T23:12:50.724ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299632025-03-07T23:12:50.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299642025-03-07T23:12:50.735ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299652025-03-07T23:12:50.735ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299662025-03-07T23:12:50.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299672025-03-07T23:12:50.738ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299682025-03-07T23:12:50.739ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299692025-03-07T23:12:50.740ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299702025-03-07T23:12:50.742ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299712025-03-07T23:12:50.743ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299722025-03-07T23:12:50.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299732025-03-07T23:12:50.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299742025-03-07T23:12:50.748ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299752025-03-07T23:12:50.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299762025-03-07T23:12:50.748ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299772025-03-07T23:12:50.750ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299782025-03-07T23:12:50.753ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299792025-03-07T23:12:50.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299802025-03-07T23:12:50.754ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299812025-03-07T23:12:50.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299822025-03-07T23:12:50.760ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299832025-03-07T23:12:50.760ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299842025-03-07T23:12:50.760ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299852025-03-07T23:12:50.761ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299862025-03-07T23:12:50.769ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299872025-03-07T23:12:50.779ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299882025-03-07T23:12:50.779ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299892025-03-07T23:12:50.780ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299902025-03-07T23:12:50.780ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299912025-03-07T23:12:50.780ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299922025-03-07T23:12:50.781ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299932025-03-07T23:12:50.787ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299942025-03-07T23:12:50.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299952025-03-07T23:12:50.787ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299962025-03-07T23:12:50.788ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299972025-03-07T23:12:50.817ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299982025-03-07T23:12:50.817ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
299992025-03-07T23:12:50.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300002025-03-07T23:12:50.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300012025-03-07T23:12:50.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300022025-03-07T23:12:50.849ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300032025-03-07T23:12:50.850ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300042025-03-07T23:12:50.850ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300052025-03-07T23:12:50.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300062025-03-07T23:12:50.860ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 196955 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1afc4db1-c1a2-44c2-8098-948e3ad95fce response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300072025-03-07T23:12:50.861ZINFOtest_unauthorized (external client test context): client received response status = 200
300082025-03-07T23:12:50.861ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300092025-03-07T23:12:50.861ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300102025-03-07T23:12:50.862ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300112025-03-07T23:12:50.867ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300122025-03-07T23:12:50.868ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300132025-03-07T23:12:50.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300142025-03-07T23:12:50.871ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300152025-03-07T23:12:50.874ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300162025-03-07T23:12:50.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300172025-03-07T23:12:50.879ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300182025-03-07T23:12:50.879ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300192025-03-07T23:12:50.884ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
300202025-03-07T23:12:50.886ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
300212025-03-07T23:12:50.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300222025-03-07T23:12:50.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300232025-03-07T23:12:50.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300242025-03-07T23:12:50.895ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
300252025-03-07T23:12:50.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300262025-03-07T23:12:50.896ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300272025-03-07T23:12:50.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300282025-03-07T23:12:50.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
300292025-03-07T23:12:50.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
300302025-03-07T23:12:50.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300312025-03-07T23:12:50.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300322025-03-07T23:12:50.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300332025-03-07T23:12:50.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
300342025-03-07T23:12:50.916ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
300352025-03-07T23:12:50.916ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300362025-03-07T23:12:50.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300372025-03-07T23:12:50.917ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300382025-03-07T23:12:50.926ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
300392025-03-07T23:12:50.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300402025-03-07T23:12:50.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300412025-03-07T23:12:50.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300422025-03-07T23:12:50.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
300432025-03-07T23:12:50.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
300442025-03-07T23:12:50.938ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300452025-03-07T23:12:50.938ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300462025-03-07T23:12:50.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300472025-03-07T23:12:50.940ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300482025-03-07T23:12:50.943ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300492025-03-07T23:12:50.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300502025-03-07T23:12:50.944ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300512025-03-07T23:12:50.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300522025-03-07T23:12:50.947ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300532025-03-07T23:12:50.948ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300542025-03-07T23:12:50.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300552025-03-07T23:12:50.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300562025-03-07T23:12:50.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300572025-03-07T23:12:50.953ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300582025-03-07T23:12:50.954ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300592025-03-07T23:12:50.961ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300602025-03-07T23:12:50.961ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300612025-03-07T23:12:50.961ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300622025-03-07T23:12:50.962ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300632025-03-07T23:12:50.966ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300642025-03-07T23:12:50.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300652025-03-07T23:12:50.966ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300662025-03-07T23:12:50.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300672025-03-07T23:12:50.970ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300682025-03-07T23:12:50.986ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300692025-03-07T23:12:50.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 124791 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ef1d56a2-2920-43a3-afee-bdb3b71e6d77 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300702025-03-07T23:12:50.987ZINFOtest_unauthorized (external client test context): client received response status = 404
300712025-03-07T23:12:50.987ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300722025-03-07T23:12:50.987ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300732025-03-07T23:12:50.988ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d2afda9e-8dc5-4f2c-9249-ef732fbe112d uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300742025-03-07T23:12:50.988ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d2afda9e-8dc5-4f2c-9249-ef732fbe112d uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300752025-03-07T23:12:50.988ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d2afda9e-8dc5-4f2c-9249-ef732fbe112d uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300762025-03-07T23:12:50.988ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d2afda9e-8dc5-4f2c-9249-ef732fbe112d uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300772025-03-07T23:12:50.988ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 535 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d2afda9e-8dc5-4f2c-9249-ef732fbe112d response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300782025-03-07T23:12:50.988ZINFOtest_unauthorized (external client test context): client received response status = 401
300792025-03-07T23:12:50.989ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300802025-03-07T23:12:50.989ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300812025-03-07T23:12:50.991ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 47b15898-44aa-4df7-9fe9-cfbc88deede6 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300822025-03-07T23:12:50.991ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 47b15898-44aa-4df7-9fe9-cfbc88deede6 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300832025-03-07T23:12:50.993ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 47b15898-44aa-4df7-9fe9-cfbc88deede6 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300842025-03-07T23:12:50.993ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 297 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 47b15898-44aa-4df7-9fe9-cfbc88deede6 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300852025-03-07T23:12:50.993ZINFOtest_unauthorized (external client test context): client received response status = 401
300862025-03-07T23:12:50.993ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300872025-03-07T23:12:50.993ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300882025-03-07T23:12:50.993ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c1216a6f-6ab3-4882-bb7d-943d63586f04 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300892025-03-07T23:12:50.993ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c1216a6f-6ab3-4882-bb7d-943d63586f04 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300902025-03-07T23:12:50.994ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2632:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2665:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c1216a6f-6ab3-4882-bb7d-943d63586f04 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300912025-03-07T23:12:50.994ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1010 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c1216a6f-6ab3-4882-bb7d-943d63586f04 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300922025-03-07T23:12:50.995ZINFOtest_unauthorized (external client test context): client received response status = 401
300932025-03-07T23:12:50.995ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300942025-03-07T23:12:50.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300952025-03-07T23:12:50.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ef2d935e-92b5-46ad-93b9-e28ae1c9a785 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300962025-03-07T23:12:50.995ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ef2d935e-92b5-46ad-93b9-e28ae1c9a785 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300972025-03-07T23:12:50.995ZINFOtest_unauthorized (external client test context): client received response status = 405
300982025-03-07T23:12:50.995ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
300992025-03-07T23:12:50.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301002025-03-07T23:12:50.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38345256-0663-402a-b787-cd8df593e160 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301012025-03-07T23:12:50.996ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38345256-0663-402a-b787-cd8df593e160 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301022025-03-07T23:12:50.996ZINFOtest_unauthorized (external client test context): client received response status = 405
301032025-03-07T23:12:50.996ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301042025-03-07T23:12:50.996ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301052025-03-07T23:12:50.996ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8871a5b9-dbbb-422b-9e0e-a541b9864c4c uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301062025-03-07T23:12:50.997ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8871a5b9-dbbb-422b-9e0e-a541b9864c4c response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301072025-03-07T23:12:50.997ZINFOtest_unauthorized (external client test context): client received response status = 405
301082025-03-07T23:12:50.997ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301092025-03-07T23:12:50.997ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301102025-03-07T23:12:50.997ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9e87e07b-5219-41d1-81fa-62c9b0823cee uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301112025-03-07T23:12:50.997ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 196 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9e87e07b-5219-41d1-81fa-62c9b0823cee response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301122025-03-07T23:12:50.999ZINFOtest_unauthorized (external client test context): client received response status = 405
301132025-03-07T23:12:50.999ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301142025-03-07T23:12:50.999ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301152025-03-07T23:12:50.999ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301162025-03-07T23:12:50.999ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301172025-03-07T23:12:50.999ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301182025-03-07T23:12:50.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301192025-03-07T23:12:50.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301202025-03-07T23:12:51.000ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301212025-03-07T23:12:51.002ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301222025-03-07T23:12:51.002ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301232025-03-07T23:12:51.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301242025-03-07T23:12:51.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
301252025-03-07T23:12:51.023ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
301262025-03-07T23:12:51.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301272025-03-07T23:12:51.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301282025-03-07T23:12:51.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301292025-03-07T23:12:51.034ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
301302025-03-07T23:12:51.034ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301312025-03-07T23:12:51.034ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301322025-03-07T23:12:51.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301332025-03-07T23:12:51.038ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
301342025-03-07T23:12:51.042ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
301352025-03-07T23:12:51.042ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301362025-03-07T23:12:51.042ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301372025-03-07T23:12:51.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301382025-03-07T23:12:51.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
301392025-03-07T23:12:51.069ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
301402025-03-07T23:12:51.069ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301412025-03-07T23:12:51.069ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301422025-03-07T23:12:51.069ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301432025-03-07T23:12:51.070ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
301442025-03-07T23:12:51.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301452025-03-07T23:12:51.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301462025-03-07T23:12:51.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301472025-03-07T23:12:51.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
301482025-03-07T23:12:51.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
301492025-03-07T23:12:51.073ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301502025-03-07T23:12:51.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301512025-03-07T23:12:51.073ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301522025-03-07T23:12:51.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301532025-03-07T23:12:51.075ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301542025-03-07T23:12:51.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301552025-03-07T23:12:51.077ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301562025-03-07T23:12:51.079ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301572025-03-07T23:12:51.079ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301582025-03-07T23:12:51.080ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301592025-03-07T23:12:51.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301602025-03-07T23:12:51.084ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301612025-03-07T23:12:51.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301622025-03-07T23:12:51.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301632025-03-07T23:12:51.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301642025-03-07T23:12:51.088ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301652025-03-07T23:12:51.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301662025-03-07T23:12:51.088ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301672025-03-07T23:12:51.089ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301682025-03-07T23:12:51.093ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301692025-03-07T23:12:51.093ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301702025-03-07T23:12:51.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301712025-03-07T23:12:51.096ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301722025-03-07T23:12:51.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301732025-03-07T23:12:51.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301742025-03-07T23:12:51.139ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 140877 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 85f9d243-e0d9-48c9-9c42-632412c6b1ab response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301752025-03-07T23:12:51.140ZINFOtest_unauthorized (external client test context): client received response status = 404
301762025-03-07T23:12:51.140ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301772025-03-07T23:12:51.140ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301782025-03-07T23:12:51.140ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0c132180-30ea-47d6-8456-358c458cd3bf uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301792025-03-07T23:12:51.140ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0c132180-30ea-47d6-8456-358c458cd3bf uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301802025-03-07T23:12:51.141ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0c132180-30ea-47d6-8456-358c458cd3bf uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301812025-03-07T23:12:51.141ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0c132180-30ea-47d6-8456-358c458cd3bf uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301822025-03-07T23:12:51.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 828 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0c132180-30ea-47d6-8456-358c458cd3bf response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301832025-03-07T23:12:51.143ZINFOtest_unauthorized (external client test context): client received response status = 401
301842025-03-07T23:12:51.143ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301852025-03-07T23:12:51.143ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301862025-03-07T23:12:51.143ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ca1a13b4-d478-4ac7-894f-c38fe6bac870 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301872025-03-07T23:12:51.143ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ca1a13b4-d478-4ac7-894f-c38fe6bac870 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301882025-03-07T23:12:51.143ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ca1a13b4-d478-4ac7-894f-c38fe6bac870 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301892025-03-07T23:12:51.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1053 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ca1a13b4-d478-4ac7-894f-c38fe6bac870 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301902025-03-07T23:12:51.144ZINFOtest_unauthorized (external client test context): client received response status = 401
301912025-03-07T23:12:51.144ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301922025-03-07T23:12:51.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301932025-03-07T23:12:51.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f725db20-25f6-46b0-b435-97a405fb40fa uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301942025-03-07T23:12:51.145ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f725db20-25f6-46b0-b435-97a405fb40fa uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301952025-03-07T23:12:51.147ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2676:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2710:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f725db20-25f6-46b0-b435-97a405fb40fa uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301962025-03-07T23:12:51.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1332 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f725db20-25f6-46b0-b435-97a405fb40fa response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301972025-03-07T23:12:51.147ZINFOtest_unauthorized (external client test context): client received response status = 401
301982025-03-07T23:12:51.147ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
301992025-03-07T23:12:51.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302002025-03-07T23:12:51.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302012025-03-07T23:12:51.147ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302022025-03-07T23:12:51.147ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302032025-03-07T23:12:51.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302042025-03-07T23:12:51.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302052025-03-07T23:12:51.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302062025-03-07T23:12:51.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302072025-03-07T23:12:51.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302082025-03-07T23:12:51.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302092025-03-07T23:12:51.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
302102025-03-07T23:12:51.175ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
302112025-03-07T23:12:51.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302122025-03-07T23:12:51.177ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302132025-03-07T23:12:51.177ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302142025-03-07T23:12:51.178ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
302152025-03-07T23:12:51.179ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302162025-03-07T23:12:51.179ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302172025-03-07T23:12:51.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302182025-03-07T23:12:51.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
302192025-03-07T23:12:51.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
302202025-03-07T23:12:51.188ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302212025-03-07T23:12:51.189ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302222025-03-07T23:12:51.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302232025-03-07T23:12:51.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
302242025-03-07T23:12:51.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
302252025-03-07T23:12:51.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302262025-03-07T23:12:51.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302272025-03-07T23:12:51.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302282025-03-07T23:12:51.196ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
302292025-03-07T23:12:51.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302302025-03-07T23:12:51.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302312025-03-07T23:12:51.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302322025-03-07T23:12:51.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
302332025-03-07T23:12:51.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
302342025-03-07T23:12:51.204ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302352025-03-07T23:12:51.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302362025-03-07T23:12:51.206ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302372025-03-07T23:12:51.207ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302382025-03-07T23:12:51.209ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302392025-03-07T23:12:51.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302402025-03-07T23:12:51.210ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302412025-03-07T23:12:51.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302422025-03-07T23:12:51.214ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302432025-03-07T23:12:51.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302442025-03-07T23:12:51.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302452025-03-07T23:12:51.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302462025-03-07T23:12:51.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
302472025-03-07T23:12:51.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
302482025-03-07T23:12:51.222ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302492025-03-07T23:12:51.222ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302502025-03-07T23:12:51.226ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302512025-03-07T23:12:51.226ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302522025-03-07T23:12:51.226ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302532025-03-07T23:12:51.231ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
302542025-03-07T23:12:51.232ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
302552025-03-07T23:12:51.236ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
302562025-03-07T23:12:51.236ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302572025-03-07T23:12:51.241ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302582025-03-07T23:12:51.241ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302592025-03-07T23:12:51.241ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302602025-03-07T23:12:51.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302612025-03-07T23:12:51.249ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302622025-03-07T23:12:51.251ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302632025-03-07T23:12:51.252ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302642025-03-07T23:12:51.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302652025-03-07T23:12:51.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302662025-03-07T23:12:51.282ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302672025-03-07T23:12:51.282ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 136089 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = d5eee872-fb1e-4efd-8faf-f1370d0ce2a4 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302682025-03-07T23:12:51.283ZINFOtest_unauthorized (external client test context): client received response status = 404
302692025-03-07T23:12:51.285ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302702025-03-07T23:12:51.286ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302712025-03-07T23:12:51.286ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9ea593ae-b8bd-4d61-b896-e5d491fa3bcd uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302722025-03-07T23:12:51.286ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9ea593ae-b8bd-4d61-b896-e5d491fa3bcd uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302732025-03-07T23:12:51.286ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9ea593ae-b8bd-4d61-b896-e5d491fa3bcd uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302742025-03-07T23:12:51.286ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9ea593ae-b8bd-4d61-b896-e5d491fa3bcd uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302752025-03-07T23:12:51.286ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 402 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9ea593ae-b8bd-4d61-b896-e5d491fa3bcd response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302762025-03-07T23:12:51.287ZINFOtest_unauthorized (external client test context): client received response status = 401
302772025-03-07T23:12:51.287ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302782025-03-07T23:12:51.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302792025-03-07T23:12:51.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38ab50df-56c2-4701-8fd2-566e221cce01 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302802025-03-07T23:12:51.287ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38ab50df-56c2-4701-8fd2-566e221cce01 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302812025-03-07T23:12:51.288ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38ab50df-56c2-4701-8fd2-566e221cce01 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302822025-03-07T23:12:51.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 229 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 38ab50df-56c2-4701-8fd2-566e221cce01 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302832025-03-07T23:12:51.288ZINFOtest_unauthorized (external client test context): client received response status = 401
302842025-03-07T23:12:51.288ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302852025-03-07T23:12:51.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302862025-03-07T23:12:51.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a396924-af3f-4ee4-ae41-20c8b8457b4e uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302872025-03-07T23:12:51.289ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a396924-af3f-4ee4-ae41-20c8b8457b4e uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302882025-03-07T23:12:51.289ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2721:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2754:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a396924-af3f-4ee4-ae41-20c8b8457b4e uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302892025-03-07T23:12:51.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1005 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0a396924-af3f-4ee4-ae41-20c8b8457b4e response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302902025-03-07T23:12:51.289ZINFOtest_unauthorized (external client test context): client received response status = 401
302912025-03-07T23:12:51.290ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302922025-03-07T23:12:51.290ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302932025-03-07T23:12:51.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41591f32-94ac-47a2-9da3-16ab6bfc526c uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302942025-03-07T23:12:51.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 41591f32-94ac-47a2-9da3-16ab6bfc526c response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302952025-03-07T23:12:51.290ZINFOtest_unauthorized (external client test context): client received response status = 405
302962025-03-07T23:12:51.291ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302972025-03-07T23:12:51.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302982025-03-07T23:12:51.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = debadc8a-3fd7-46ef-bb90-312f57974fe8 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
302992025-03-07T23:12:51.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = debadc8a-3fd7-46ef-bb90-312f57974fe8 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303002025-03-07T23:12:51.291ZINFOtest_unauthorized (external client test context): client received response status = 405
303012025-03-07T23:12:51.291ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303022025-03-07T23:12:51.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303032025-03-07T23:12:51.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6c6dc41c-79ee-4e01-921e-aff54da77934 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303042025-03-07T23:12:51.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 6c6dc41c-79ee-4e01-921e-aff54da77934 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303052025-03-07T23:12:51.292ZINFOtest_unauthorized (external client test context): client received response status = 405
303062025-03-07T23:12:51.292ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303072025-03-07T23:12:51.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303082025-03-07T23:12:51.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b810ccac-0ffd-48c0-a04c-7b8b8316e512 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303092025-03-07T23:12:51.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b810ccac-0ffd-48c0-a04c-7b8b8316e512 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303102025-03-07T23:12:51.292ZINFOtest_unauthorized (external client test context): client received response status = 405
303112025-03-07T23:12:51.293ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303122025-03-07T23:12:51.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303132025-03-07T23:12:51.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303142025-03-07T23:12:51.293ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303152025-03-07T23:12:51.293ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303162025-03-07T23:12:51.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303172025-03-07T23:12:51.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303182025-03-07T23:12:51.294ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303192025-03-07T23:12:51.297ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303202025-03-07T23:12:51.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303212025-03-07T23:12:51.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303222025-03-07T23:12:51.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
303232025-03-07T23:12:51.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
303242025-03-07T23:12:51.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303252025-03-07T23:12:51.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303262025-03-07T23:12:51.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303272025-03-07T23:12:51.302ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
303282025-03-07T23:12:51.302ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303292025-03-07T23:12:51.302ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303302025-03-07T23:12:51.304ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303312025-03-07T23:12:51.309ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
303322025-03-07T23:12:51.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
303332025-03-07T23:12:51.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303342025-03-07T23:12:51.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303352025-03-07T23:12:51.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303362025-03-07T23:12:51.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
303372025-03-07T23:12:51.316ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
303382025-03-07T23:12:51.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303392025-03-07T23:12:51.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303402025-03-07T23:12:51.317ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303412025-03-07T23:12:51.319ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
303422025-03-07T23:12:51.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303432025-03-07T23:12:51.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303442025-03-07T23:12:51.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303452025-03-07T23:12:51.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
303462025-03-07T23:12:51.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
303472025-03-07T23:12:51.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
303482025-03-07T23:12:51.328ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303492025-03-07T23:12:51.328ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303502025-03-07T23:12:51.329ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303512025-03-07T23:12:51.329ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303522025-03-07T23:12:51.333ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303532025-03-07T23:12:51.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303542025-03-07T23:12:51.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303552025-03-07T23:12:51.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303562025-03-07T23:12:51.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303572025-03-07T23:12:51.341ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303582025-03-07T23:12:51.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303592025-03-07T23:12:51.343ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303602025-03-07T23:12:51.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303612025-03-07T23:12:51.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303622025-03-07T23:12:51.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303632025-03-07T23:12:51.346ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303642025-03-07T23:12:51.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303652025-03-07T23:12:51.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303662025-03-07T23:12:51.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303672025-03-07T23:12:51.349ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303682025-03-07T23:12:51.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303692025-03-07T23:12:51.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303702025-03-07T23:12:51.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303712025-03-07T23:12:51.355ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303722025-03-07T23:12:51.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303732025-03-07T23:12:51.365ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303742025-03-07T23:12:51.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303752025-03-07T23:12:51.370ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303762025-03-07T23:12:51.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303772025-03-07T23:12:51.376ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303782025-03-07T23:12:51.376ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303792025-03-07T23:12:51.378ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303802025-03-07T23:12:51.384ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303812025-03-07T23:12:51.384ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303822025-03-07T23:12:51.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303832025-03-07T23:12:51.385ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303842025-03-07T23:12:51.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303852025-03-07T23:12:51.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303862025-03-07T23:12:51.385ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303872025-03-07T23:12:51.386ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303882025-03-07T23:12:51.387ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303892025-03-07T23:12:51.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303902025-03-07T23:12:51.388ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303912025-03-07T23:12:51.391ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303922025-03-07T23:12:51.391ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303932025-03-07T23:12:51.393ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303942025-03-07T23:12:51.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303952025-03-07T23:12:51.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303962025-03-07T23:12:51.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303972025-03-07T23:12:51.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303982025-03-07T23:12:51.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
303992025-03-07T23:12:51.409ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304002025-03-07T23:12:51.409ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304012025-03-07T23:12:51.409ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304022025-03-07T23:12:51.413ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304032025-03-07T23:12:51.413ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304042025-03-07T23:12:51.413ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304052025-03-07T23:12:51.414ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304062025-03-07T23:12:51.417ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304072025-03-07T23:12:51.417ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304082025-03-07T23:12:51.417ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304092025-03-07T23:12:51.418ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304102025-03-07T23:12:51.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304112025-03-07T23:12:51.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304122025-03-07T23:12:51.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304132025-03-07T23:12:51.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304142025-03-07T23:12:51.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304152025-03-07T23:12:51.435ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 142640 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fd7de7b7-7876-4798-a9d1-3221851b8928 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
304162025-03-07T23:12:51.435ZINFOtest_unauthorized (external client test context): client received response status = 200
304172025-03-07T23:12:51.436ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups?project=demo-project
304182025-03-07T23:12:51.437ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups?project=demo-project
304192025-03-07T23:12:51.437ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
304202025-03-07T23:12:51.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a uri = /v1/anti-affinity-groups?project=demo-project
304212025-03-07T23:12:51.437ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a uri = /v1/anti-affinity-groups?project=demo-project
304222025-03-07T23:12:51.437ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
304232025-03-07T23:12:51.437ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304242025-03-07T23:12:51.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304252025-03-07T23:12:51.438ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304262025-03-07T23:12:51.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304272025-03-07T23:12:51.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304282025-03-07T23:12:51.441ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304292025-03-07T23:12:51.445ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
304302025-03-07T23:12:51.447ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
304312025-03-07T23:12:51.447ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304322025-03-07T23:12:51.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304332025-03-07T23:12:51.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304342025-03-07T23:12:51.449ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
304352025-03-07T23:12:51.449ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304362025-03-07T23:12:51.450ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304372025-03-07T23:12:51.450ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304382025-03-07T23:12:51.452ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
304392025-03-07T23:12:51.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
304402025-03-07T23:12:51.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304412025-03-07T23:12:51.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304422025-03-07T23:12:51.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304432025-03-07T23:12:51.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
304442025-03-07T23:12:51.458ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
304452025-03-07T23:12:51.460ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304462025-03-07T23:12:51.461ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304472025-03-07T23:12:51.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304482025-03-07T23:12:51.464ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
304492025-03-07T23:12:51.464ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304502025-03-07T23:12:51.465ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304512025-03-07T23:12:51.466ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304522025-03-07T23:12:51.468ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
304532025-03-07T23:12:51.471ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
304542025-03-07T23:12:51.471ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a uri = /v1/anti-affinity-groups?project=demo-project
304552025-03-07T23:12:51.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304562025-03-07T23:12:51.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304572025-03-07T23:12:51.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304582025-03-07T23:12:51.476ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304592025-03-07T23:12:51.476ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304602025-03-07T23:12:51.477ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304612025-03-07T23:12:51.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
304622025-03-07T23:12:51.482ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
304632025-03-07T23:12:51.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304642025-03-07T23:12:51.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304652025-03-07T23:12:51.483ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304662025-03-07T23:12:51.487ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
304672025-03-07T23:12:51.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304682025-03-07T23:12:51.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304692025-03-07T23:12:51.488ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304702025-03-07T23:12:51.491ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
304712025-03-07T23:12:51.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304722025-03-07T23:12:51.492ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304732025-03-07T23:12:51.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304742025-03-07T23:12:51.534ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
304752025-03-07T23:12:51.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304762025-03-07T23:12:51.552ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
304772025-03-07T23:12:51.554ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
304782025-03-07T23:12:51.554ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304792025-03-07T23:12:51.554ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304802025-03-07T23:12:51.555ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304812025-03-07T23:12:51.560ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
304822025-03-07T23:12:51.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304832025-03-07T23:12:51.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304842025-03-07T23:12:51.562ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304852025-03-07T23:12:51.568ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
304862025-03-07T23:12:51.568ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304872025-03-07T23:12:51.568ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304882025-03-07T23:12:51.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304892025-03-07T23:12:51.573ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
304902025-03-07T23:12:51.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
304912025-03-07T23:12:51.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
304922025-03-07T23:12:51.583ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304932025-03-07T23:12:51.584ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
304942025-03-07T23:12:51.584ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
304952025-03-07T23:12:51.594ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
304962025-03-07T23:12:51.596ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8f6ec026-e26f-4634-af1a-f422b9594eca uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
304972025-03-07T23:12:51.597ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304982025-03-07T23:12:51.597ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8f6ec026-e26f-4634-af1a-f422b9594eca resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
304992025-03-07T23:12:51.597ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8f6ec026-e26f-4634-af1a-f422b9594eca roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
305002025-03-07T23:12:51.598ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8f6ec026-e26f-4634-af1a-f422b9594eca resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
305012025-03-07T23:12:51.598ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305022025-03-07T23:12:51.602ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 165639 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2e7e5b72-2281-400d-bcbf-fc888facbe1a response_code = 200 uri = /v1/anti-affinity-groups?project=demo-project
305032025-03-07T23:12:51.602ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305042025-03-07T23:12:51.606ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305052025-03-07T23:12:51.606ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305062025-03-07T23:12:51.606ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305072025-03-07T23:12:51.607ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 10848 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 8f6ec026-e26f-4634-af1a-f422b9594eca response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
305082025-03-07T23:12:51.607ZINFOtest_unauthorized (external client test context): client received response status = 200
305092025-03-07T23:12:51.608ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups?project=demo-project
305102025-03-07T23:12:51.608ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
305112025-03-07T23:12:51.609ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "8f6ec026-e26f-4634-af1a-f422b9594eca", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:51 GMT"} })
305122025-03-07T23:12:51.609ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305132025-03-07T23:12:51.609ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 uri = /v1/anti-affinity-groups?project=demo-project
305142025-03-07T23:12:51.609ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 17c04ae3-56f6-4448-848e-f744f34e636a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305152025-03-07T23:12:51.609ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 uri = /v1/anti-affinity-groups?project=demo-project
305162025-03-07T23:12:51.609ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups?project=demo-project
305172025-03-07T23:12:51.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305182025-03-07T23:12:51.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305192025-03-07T23:12:51.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305202025-03-07T23:12:51.611ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 17c04ae3-56f6-4448-848e-f744f34e636a resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305212025-03-07T23:12:51.611ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 17c04ae3-56f6-4448-848e-f744f34e636a roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305222025-03-07T23:12:51.612ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 17c04ae3-56f6-4448-848e-f744f34e636a resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305232025-03-07T23:12:51.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305242025-03-07T23:12:51.616ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305252025-03-07T23:12:51.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305262025-03-07T23:12:51.622ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
305272025-03-07T23:12:51.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
305282025-03-07T23:12:51.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305292025-03-07T23:12:51.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305302025-03-07T23:12:51.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305312025-03-07T23:12:51.623ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14180 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 17c04ae3-56f6-4448-848e-f744f34e636a response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
305322025-03-07T23:12:51.624ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "17c04ae3-56f6-4448-848e-f744f34e636a", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:51 GMT"} })
305332025-03-07T23:12:51.624ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
305342025-03-07T23:12:51.626ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
305352025-03-07T23:12:51.626ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
305362025-03-07T23:12:51.626ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
305372025-03-07T23:12:51.629ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305382025-03-07T23:12:51.629ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305392025-03-07T23:12:51.631ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305402025-03-07T23:12:51.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
305412025-03-07T23:12:51.641ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
305422025-03-07T23:12:51.642ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305432025-03-07T23:12:51.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305442025-03-07T23:12:51.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305452025-03-07T23:12:51.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
305462025-03-07T23:12:51.652ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
305472025-03-07T23:12:51.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305482025-03-07T23:12:51.652ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305492025-03-07T23:12:51.654ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305502025-03-07T23:12:51.656ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
305512025-03-07T23:12:51.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305522025-03-07T23:12:51.661ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305532025-03-07T23:12:51.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305542025-03-07T23:12:51.665ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
305552025-03-07T23:12:51.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
305562025-03-07T23:12:51.670ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 uri = /v1/anti-affinity-groups?project=demo-project
305572025-03-07T23:12:51.670ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
305582025-03-07T23:12:51.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305592025-03-07T23:12:51.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
305602025-03-07T23:12:51.674ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
305612025-03-07T23:12:51.674ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305622025-03-07T23:12:51.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
305632025-03-07T23:12:51.677ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
305642025-03-07T23:12:51.680ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
305652025-03-07T23:12:51.680ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
305662025-03-07T23:12:51.680ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305672025-03-07T23:12:51.680ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
305682025-03-07T23:12:51.682ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
305692025-03-07T23:12:51.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
305702025-03-07T23:12:51.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305712025-03-07T23:12:51.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
305722025-03-07T23:12:51.685ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
305732025-03-07T23:12:51.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
305742025-03-07T23:12:51.686ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305752025-03-07T23:12:51.686ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
305762025-03-07T23:12:51.690ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
305772025-03-07T23:12:51.709ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/anti-affinity-groups?project=demo-project
305782025-03-07T23:12:51.709ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 100929 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 94056163-cc38-4a72-9fc6-dfa619c7d578 response_code = 404 uri = /v1/anti-affinity-groups?project=demo-project
305792025-03-07T23:12:51.710ZINFOtest_unauthorized (external client test context): client received response status = 404
305802025-03-07T23:12:51.711ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups?project=demo-project
305812025-03-07T23:12:51.711ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
305822025-03-07T23:12:51.711ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4d5b99f-9e1f-4e82-964d-ab7cc8184c3c uri = /v1/anti-affinity-groups?project=demo-project
305832025-03-07T23:12:51.711ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4d5b99f-9e1f-4e82-964d-ab7cc8184c3c uri = /v1/anti-affinity-groups?project=demo-project
305842025-03-07T23:12:51.711ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4d5b99f-9e1f-4e82-964d-ab7cc8184c3c uri = /v1/anti-affinity-groups?project=demo-project
305852025-03-07T23:12:51.711ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4d5b99f-9e1f-4e82-964d-ab7cc8184c3c uri = /v1/anti-affinity-groups?project=demo-project
305862025-03-07T23:12:51.711ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 311 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4d5b99f-9e1f-4e82-964d-ab7cc8184c3c response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
305872025-03-07T23:12:51.711ZINFOtest_unauthorized (external client test context): client received response status = 401
305882025-03-07T23:12:51.711ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups?project=demo-project
305892025-03-07T23:12:51.711ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
305902025-03-07T23:12:51.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19ab4f86-3359-46dd-a2ea-01f84b9edb7c uri = /v1/anti-affinity-groups?project=demo-project
305912025-03-07T23:12:51.712ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19ab4f86-3359-46dd-a2ea-01f84b9edb7c uri = /v1/anti-affinity-groups?project=demo-project
305922025-03-07T23:12:51.712ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19ab4f86-3359-46dd-a2ea-01f84b9edb7c uri = /v1/anti-affinity-groups?project=demo-project
305932025-03-07T23:12:51.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 182 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 19ab4f86-3359-46dd-a2ea-01f84b9edb7c response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
305942025-03-07T23:12:51.712ZINFOtest_unauthorized (external client test context): client received response status = 401
305952025-03-07T23:12:51.712ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups?project=demo-project
305962025-03-07T23:12:51.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
305972025-03-07T23:12:51.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3748904e-bd01-4385-ba02-e5e65229b056 uri = /v1/anti-affinity-groups?project=demo-project
305982025-03-07T23:12:51.713ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3748904e-bd01-4385-ba02-e5e65229b056 uri = /v1/anti-affinity-groups?project=demo-project
305992025-03-07T23:12:51.713ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2855:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2879:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3748904e-bd01-4385-ba02-e5e65229b056 uri = /v1/anti-affinity-groups?project=demo-project
306002025-03-07T23:12:51.714ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 886 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3748904e-bd01-4385-ba02-e5e65229b056 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
306012025-03-07T23:12:51.714ZINFOtest_unauthorized (external client test context): client received response status = 401
306022025-03-07T23:12:51.714ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups?project=demo-project
306032025-03-07T23:12:51.714ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306042025-03-07T23:12:51.714ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f716710c-f704-4710-8514-4b0b48edf595 uri = /v1/anti-affinity-groups?project=demo-project
306052025-03-07T23:12:51.714ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f716710c-f704-4710-8514-4b0b48edf595 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
306062025-03-07T23:12:51.714ZINFOtest_unauthorized (external client test context): client received response status = 405
306072025-03-07T23:12:51.715ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups?project=demo-project
306082025-03-07T23:12:51.715ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306092025-03-07T23:12:51.715ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f1f4c9f4-de20-4bc6-96f0-f54d6eeae4f4 uri = /v1/anti-affinity-groups?project=demo-project
306102025-03-07T23:12:51.716ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f1f4c9f4-de20-4bc6-96f0-f54d6eeae4f4 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
306112025-03-07T23:12:51.716ZINFOtest_unauthorized (external client test context): client received response status = 405
306122025-03-07T23:12:51.716ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups?project=demo-project
306132025-03-07T23:12:51.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306142025-03-07T23:12:51.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7d222716-2b4e-43f4-91b2-6a12608232b8 uri = /v1/anti-affinity-groups?project=demo-project
306152025-03-07T23:12:51.716ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7d222716-2b4e-43f4-91b2-6a12608232b8 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
306162025-03-07T23:12:51.716ZINFOtest_unauthorized (external client test context): client received response status = 405
306172025-03-07T23:12:51.716ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups?project=demo-project
306182025-03-07T23:12:51.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306192025-03-07T23:12:51.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 65e72f40-f9c1-4b15-b681-7bacd8ffe3d7 uri = /v1/anti-affinity-groups?project=demo-project
306202025-03-07T23:12:51.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 65e72f40-f9c1-4b15-b681-7bacd8ffe3d7 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
306212025-03-07T23:12:51.717ZINFOtest_unauthorized (external client test context): client received response status = 405
306222025-03-07T23:12:51.717ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups?project=demo-project
306232025-03-07T23:12:51.717ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306242025-03-07T23:12:51.717ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff uri = /v1/anti-affinity-groups?project=demo-project
306252025-03-07T23:12:51.718ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff uri = /v1/anti-affinity-groups?project=demo-project
306262025-03-07T23:12:51.718ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups?project=demo-project
306272025-03-07T23:12:51.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306282025-03-07T23:12:51.718ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306292025-03-07T23:12:51.718ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306302025-03-07T23:12:51.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306312025-03-07T23:12:51.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306322025-03-07T23:12:51.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306332025-03-07T23:12:51.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
306342025-03-07T23:12:51.722ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
306352025-03-07T23:12:51.722ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306362025-03-07T23:12:51.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306372025-03-07T23:12:51.723ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306382025-03-07T23:12:51.725ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
306392025-03-07T23:12:51.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306402025-03-07T23:12:51.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306412025-03-07T23:12:51.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306422025-03-07T23:12:51.730ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
306432025-03-07T23:12:51.735ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
306442025-03-07T23:12:51.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306452025-03-07T23:12:51.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306462025-03-07T23:12:51.737ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306472025-03-07T23:12:51.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
306482025-03-07T23:12:51.739ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
306492025-03-07T23:12:51.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306502025-03-07T23:12:51.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306512025-03-07T23:12:51.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306522025-03-07T23:12:51.741ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
306532025-03-07T23:12:51.742ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306542025-03-07T23:12:51.742ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306552025-03-07T23:12:51.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306562025-03-07T23:12:51.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
306572025-03-07T23:12:51.747ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
306582025-03-07T23:12:51.748ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff uri = /v1/anti-affinity-groups?project=demo-project
306592025-03-07T23:12:51.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
306602025-03-07T23:12:51.748ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306612025-03-07T23:12:51.748ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
306622025-03-07T23:12:51.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
306632025-03-07T23:12:51.751ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306642025-03-07T23:12:51.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
306652025-03-07T23:12:51.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
306662025-03-07T23:12:51.753ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
306672025-03-07T23:12:51.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
306682025-03-07T23:12:51.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306692025-03-07T23:12:51.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
306702025-03-07T23:12:51.756ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
306712025-03-07T23:12:51.757ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
306722025-03-07T23:12:51.757ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306732025-03-07T23:12:51.757ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
306742025-03-07T23:12:51.762ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
306752025-03-07T23:12:51.763ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
306762025-03-07T23:12:51.764ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306772025-03-07T23:12:51.764ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
306782025-03-07T23:12:51.771ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
306792025-03-07T23:12:51.789ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/anti-affinity-groups?project=demo-project
306802025-03-07T23:12:51.790ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 73884 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 32f2488a-0266-4063-b7d8-9eef4876f4ff response_code = 404 uri = /v1/anti-affinity-groups?project=demo-project
306812025-03-07T23:12:51.791ZINFOtest_unauthorized (external client test context): client received response status = 404
306822025-03-07T23:12:51.791ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups?project=demo-project
306832025-03-07T23:12:51.791ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306842025-03-07T23:12:51.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60296529-3d45-4dd1-b00e-ce054359e922 uri = /v1/anti-affinity-groups?project=demo-project
306852025-03-07T23:12:51.795ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60296529-3d45-4dd1-b00e-ce054359e922 uri = /v1/anti-affinity-groups?project=demo-project
306862025-03-07T23:12:51.795ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60296529-3d45-4dd1-b00e-ce054359e922 uri = /v1/anti-affinity-groups?project=demo-project
306872025-03-07T23:12:51.795ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60296529-3d45-4dd1-b00e-ce054359e922 uri = /v1/anti-affinity-groups?project=demo-project
306882025-03-07T23:12:51.795ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 743 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 60296529-3d45-4dd1-b00e-ce054359e922 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
306892025-03-07T23:12:51.797ZINFOtest_unauthorized (external client test context): client received response status = 401
306902025-03-07T23:12:51.797ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups?project=demo-project
306912025-03-07T23:12:51.797ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306922025-03-07T23:12:51.798ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d3e43554-4010-4015-a511-6553a4e65917 uri = /v1/anti-affinity-groups?project=demo-project
306932025-03-07T23:12:51.800ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d3e43554-4010-4015-a511-6553a4e65917 uri = /v1/anti-affinity-groups?project=demo-project
306942025-03-07T23:12:51.800ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d3e43554-4010-4015-a511-6553a4e65917 uri = /v1/anti-affinity-groups?project=demo-project
306952025-03-07T23:12:51.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 2891 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d3e43554-4010-4015-a511-6553a4e65917 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
306962025-03-07T23:12:51.802ZINFOtest_unauthorized (external client test context): client received response status = 401
306972025-03-07T23:12:51.802ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups?project=demo-project
306982025-03-07T23:12:51.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
306992025-03-07T23:12:51.810ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70a82a1e-de8e-4aa6-bc63-c5a90610b6b5 uri = /v1/anti-affinity-groups?project=demo-project
307002025-03-07T23:12:51.811ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70a82a1e-de8e-4aa6-bc63-c5a90610b6b5 uri = /v1/anti-affinity-groups?project=demo-project
307012025-03-07T23:12:51.812ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3241:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3260:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70a82a1e-de8e-4aa6-bc63-c5a90610b6b5 uri = /v1/anti-affinity-groups?project=demo-project
307022025-03-07T23:12:51.812ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1466 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 70a82a1e-de8e-4aa6-bc63-c5a90610b6b5 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
307032025-03-07T23:12:51.817ZINFOtest_unauthorized (external client test context): client received response status = 401
307042025-03-07T23:12:51.817ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups?project=demo-project
307052025-03-07T23:12:51.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307062025-03-07T23:12:51.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 62c3c0f6-f5fe-44b7-b25a-831d3d2e7fe3 uri = /v1/anti-affinity-groups?project=demo-project
307072025-03-07T23:12:51.818ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 62c3c0f6-f5fe-44b7-b25a-831d3d2e7fe3 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307082025-03-07T23:12:51.818ZINFOtest_unauthorized (external client test context): client received response status = 405
307092025-03-07T23:12:51.819ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups?project=demo-project
307102025-03-07T23:12:51.819ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307112025-03-07T23:12:51.819ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 36f9b5c3-eb7c-429b-9f35-05766693afe1 uri = /v1/anti-affinity-groups?project=demo-project
307122025-03-07T23:12:51.819ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 36f9b5c3-eb7c-429b-9f35-05766693afe1 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307132025-03-07T23:12:51.819ZINFOtest_unauthorized (external client test context): client received response status = 405
307142025-03-07T23:12:51.821ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups?project=demo-project
307152025-03-07T23:12:51.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307162025-03-07T23:12:51.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8e7ce5b5-41a2-4f3a-a2c8-b163c77e7677 uri = /v1/anti-affinity-groups?project=demo-project
307172025-03-07T23:12:51.821ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8e7ce5b5-41a2-4f3a-a2c8-b163c77e7677 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307182025-03-07T23:12:51.821ZINFOtest_unauthorized (external client test context): client received response status = 405
307192025-03-07T23:12:51.821ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups?project=demo-project
307202025-03-07T23:12:51.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307212025-03-07T23:12:51.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 91cbb9f5-54f4-4397-8194-1a965c235e83 uri = /v1/anti-affinity-groups?project=demo-project
307222025-03-07T23:12:51.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 91cbb9f5-54f4-4397-8194-1a965c235e83 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307232025-03-07T23:12:51.822ZINFOtest_unauthorized (external client test context): client received response status = 405
307242025-03-07T23:12:51.822ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups?project=demo-project
307252025-03-07T23:12:51.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307262025-03-07T23:12:51.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5bb1c8ff-be8f-459d-89e5-355e7d14fa9c uri = /v1/anti-affinity-groups?project=demo-project
307272025-03-07T23:12:51.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5bb1c8ff-be8f-459d-89e5-355e7d14fa9c response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307282025-03-07T23:12:51.824ZINFOtest_unauthorized (external client test context): client received response status = 405
307292025-03-07T23:12:51.824ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups?project=demo-project
307302025-03-07T23:12:51.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307312025-03-07T23:12:51.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ded08216-b366-49cd-aaaa-249faea61f36 uri = /v1/anti-affinity-groups?project=demo-project
307322025-03-07T23:12:51.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 107 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ded08216-b366-49cd-aaaa-249faea61f36 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307332025-03-07T23:12:51.824ZINFOtest_unauthorized (external client test context): client received response status = 405
307342025-03-07T23:12:51.824ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups?project=demo-project
307352025-03-07T23:12:51.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307362025-03-07T23:12:51.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 36ab3d20-505c-45db-b728-d51c8a5e9010 uri = /v1/anti-affinity-groups?project=demo-project
307372025-03-07T23:12:51.826ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 36ab3d20-505c-45db-b728-d51c8a5e9010 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307382025-03-07T23:12:51.826ZINFOtest_unauthorized (external client test context): client received response status = 405
307392025-03-07T23:12:51.826ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups?project=demo-project
307402025-03-07T23:12:51.826ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307412025-03-07T23:12:51.826ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 140bc799-c92a-4f53-842e-de0c3a3b7a29 uri = /v1/anti-affinity-groups?project=demo-project
307422025-03-07T23:12:51.826ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 140bc799-c92a-4f53-842e-de0c3a3b7a29 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
307432025-03-07T23:12:51.826ZINFOtest_unauthorized (external client test context): client received response status = 405
307442025-03-07T23:12:51.826ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups?project=demo-project
307452025-03-07T23:12:51.826ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups?project=demo-project
307462025-03-07T23:12:51.826ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 uri = /v1/anti-affinity-groups?project=demo-project
307472025-03-07T23:12:51.826ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 uri = /v1/anti-affinity-groups?project=demo-project
307482025-03-07T23:12:51.826ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
307492025-03-07T23:12:51.826ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307502025-03-07T23:12:51.826ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307512025-03-07T23:12:51.826ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307522025-03-07T23:12:51.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307532025-03-07T23:12:51.828ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307542025-03-07T23:12:51.828ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307552025-03-07T23:12:51.830ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
307562025-03-07T23:12:51.831ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
307572025-03-07T23:12:51.831ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307582025-03-07T23:12:51.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307592025-03-07T23:12:51.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307602025-03-07T23:12:51.833ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
307612025-03-07T23:12:51.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307622025-03-07T23:12:51.834ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307632025-03-07T23:12:51.834ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307642025-03-07T23:12:51.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
307652025-03-07T23:12:51.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
307662025-03-07T23:12:51.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307672025-03-07T23:12:51.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307682025-03-07T23:12:51.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307692025-03-07T23:12:51.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
307702025-03-07T23:12:51.842ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
307712025-03-07T23:12:51.843ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307722025-03-07T23:12:51.843ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307732025-03-07T23:12:51.843ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307742025-03-07T23:12:51.845ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
307752025-03-07T23:12:51.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307762025-03-07T23:12:51.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307772025-03-07T23:12:51.846ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307782025-03-07T23:12:51.847ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
307792025-03-07T23:12:51.850ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
307802025-03-07T23:12:51.851ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 uri = /v1/anti-affinity-groups?project=demo-project
307812025-03-07T23:12:51.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
307822025-03-07T23:12:51.851ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
307832025-03-07T23:12:51.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
307842025-03-07T23:12:51.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
307852025-03-07T23:12:51.854ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
307862025-03-07T23:12:51.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
307872025-03-07T23:12:51.855ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
307882025-03-07T23:12:51.856ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
307892025-03-07T23:12:51.856ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
307902025-03-07T23:12:51.856ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
307912025-03-07T23:12:51.856ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
307922025-03-07T23:12:51.860ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
307932025-03-07T23:12:51.861ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
307942025-03-07T23:12:51.861ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
307952025-03-07T23:12:51.864ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
307962025-03-07T23:12:51.866ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
307972025-03-07T23:12:51.868ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
307982025-03-07T23:12:51.868ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
307992025-03-07T23:12:51.868ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308002025-03-07T23:12:51.871ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
308012025-03-07T23:12:51.880ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308022025-03-07T23:12:51.880ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
308032025-03-07T23:12:51.880ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
308042025-03-07T23:12:51.880ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
308052025-03-07T23:12:51.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
308062025-03-07T23:12:51.882ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308072025-03-07T23:12:51.883ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
308082025-03-07T23:12:51.889ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
308092025-03-07T23:12:51.889ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
308102025-03-07T23:12:51.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308112025-03-07T23:12:51.890ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
308122025-03-07T23:12:51.890ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
308132025-03-07T23:12:51.890ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
308142025-03-07T23:12:51.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308152025-03-07T23:12:51.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
308162025-03-07T23:12:51.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308172025-03-07T23:12:51.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
308182025-03-07T23:12:51.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
308192025-03-07T23:12:51.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
308202025-03-07T23:12:51.907ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 84240 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6f56525f-897c-4fc1-bf1e-fdadc1d072a1 response_code = 200 uri = /v1/anti-affinity-groups?project=demo-project
308212025-03-07T23:12:51.910ZINFOtest_unauthorized (external client test context): client received response status = 200
308222025-03-07T23:12:51.910ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308232025-03-07T23:12:51.910ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308242025-03-07T23:12:51.910ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308252025-03-07T23:12:51.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308262025-03-07T23:12:51.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308272025-03-07T23:12:51.910ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308282025-03-07T23:12:51.910ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308292025-03-07T23:12:51.910ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308302025-03-07T23:12:51.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308312025-03-07T23:12:51.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308322025-03-07T23:12:51.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308332025-03-07T23:12:51.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308342025-03-07T23:12:51.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
308352025-03-07T23:12:51.917ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
308362025-03-07T23:12:51.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308372025-03-07T23:12:51.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308382025-03-07T23:12:51.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308392025-03-07T23:12:51.919ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
308402025-03-07T23:12:51.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308412025-03-07T23:12:51.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308422025-03-07T23:12:51.921ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308432025-03-07T23:12:51.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
308442025-03-07T23:12:51.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
308452025-03-07T23:12:51.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308462025-03-07T23:12:51.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308472025-03-07T23:12:51.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308482025-03-07T23:12:51.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
308492025-03-07T23:12:51.929ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
308502025-03-07T23:12:51.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308512025-03-07T23:12:51.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308522025-03-07T23:12:51.931ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308532025-03-07T23:12:51.932ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
308542025-03-07T23:12:51.933ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308552025-03-07T23:12:51.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308562025-03-07T23:12:51.934ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308572025-03-07T23:12:51.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
308582025-03-07T23:12:51.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
308592025-03-07T23:12:51.940ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308602025-03-07T23:12:51.940ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308612025-03-07T23:12:51.940ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308622025-03-07T23:12:51.941ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308632025-03-07T23:12:51.943ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308642025-03-07T23:12:51.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308652025-03-07T23:12:51.944ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308662025-03-07T23:12:51.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308672025-03-07T23:12:51.948ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308682025-03-07T23:12:51.948ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308692025-03-07T23:12:51.949ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308702025-03-07T23:12:51.951ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308712025-03-07T23:12:51.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308722025-03-07T23:12:51.951ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308732025-03-07T23:12:51.951ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308742025-03-07T23:12:51.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308752025-03-07T23:12:51.954ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308762025-03-07T23:12:51.954ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308772025-03-07T23:12:51.954ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308782025-03-07T23:12:51.958ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308792025-03-07T23:12:51.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308802025-03-07T23:12:51.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308812025-03-07T23:12:51.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308822025-03-07T23:12:51.962ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308832025-03-07T23:12:51.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308842025-03-07T23:12:51.970ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 59887 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 78798016-d362-4cb6-a128-0797e0c929cc response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308852025-03-07T23:12:51.970ZINFOtest_unauthorized (external client test context): client received response status = 200
308862025-03-07T23:12:51.971ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308872025-03-07T23:12:51.971ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308882025-03-07T23:12:51.971ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308892025-03-07T23:12:51.971ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308902025-03-07T23:12:51.971ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
308912025-03-07T23:12:51.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308922025-03-07T23:12:51.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308932025-03-07T23:12:51.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308942025-03-07T23:12:51.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308952025-03-07T23:12:51.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308962025-03-07T23:12:51.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308972025-03-07T23:12:51.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
308982025-03-07T23:12:51.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
308992025-03-07T23:12:51.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309002025-03-07T23:12:51.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309012025-03-07T23:12:51.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309022025-03-07T23:12:51.978ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309032025-03-07T23:12:51.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309042025-03-07T23:12:51.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309052025-03-07T23:12:51.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309062025-03-07T23:12:51.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
309072025-03-07T23:12:51.983ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
309082025-03-07T23:12:51.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309092025-03-07T23:12:51.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309102025-03-07T23:12:51.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309112025-03-07T23:12:51.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
309122025-03-07T23:12:51.985ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309132025-03-07T23:12:51.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309142025-03-07T23:12:51.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309152025-03-07T23:12:51.986ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309162025-03-07T23:12:51.987ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309172025-03-07T23:12:51.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309182025-03-07T23:12:51.988ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309192025-03-07T23:12:51.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309202025-03-07T23:12:51.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
309212025-03-07T23:12:51.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
309222025-03-07T23:12:51.994ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309232025-03-07T23:12:51.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309242025-03-07T23:12:51.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309252025-03-07T23:12:51.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309262025-03-07T23:12:52.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309272025-03-07T23:12:52.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309282025-03-07T23:12:52.001ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309292025-03-07T23:12:52.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309302025-03-07T23:12:52.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309312025-03-07T23:12:52.001ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309322025-03-07T23:12:52.003ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309332025-03-07T23:12:52.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309342025-03-07T23:12:52.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309352025-03-07T23:12:52.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309362025-03-07T23:12:52.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309372025-03-07T23:12:52.006ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309382025-03-07T23:12:52.007ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309392025-03-07T23:12:52.007ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309402025-03-07T23:12:52.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309412025-03-07T23:12:52.010ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309422025-03-07T23:12:52.010ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309432025-03-07T23:12:52.010ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309442025-03-07T23:12:52.011ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309452025-03-07T23:12:52.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309462025-03-07T23:12:52.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309472025-03-07T23:12:52.028ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 57729 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 630a90d6-c115-4738-a467-9fa1e64c76f2 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309482025-03-07T23:12:52.029ZINFOtest_unauthorized (external client test context): client received response status = 404
309492025-03-07T23:12:52.029ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309502025-03-07T23:12:52.029ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309512025-03-07T23:12:52.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad295dcb-0f05-44ba-be67-43ff3c8566fe uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309522025-03-07T23:12:52.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad295dcb-0f05-44ba-be67-43ff3c8566fe uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309532025-03-07T23:12:52.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad295dcb-0f05-44ba-be67-43ff3c8566fe uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309542025-03-07T23:12:52.032ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad295dcb-0f05-44ba-be67-43ff3c8566fe uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309552025-03-07T23:12:52.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 389 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ad295dcb-0f05-44ba-be67-43ff3c8566fe response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309562025-03-07T23:12:52.033ZINFOtest_unauthorized (external client test context): client received response status = 401
309572025-03-07T23:12:52.033ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309582025-03-07T23:12:52.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309592025-03-07T23:12:52.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5853f5f8-cc86-48df-a4b2-7111a82f455f uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309602025-03-07T23:12:52.033ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5853f5f8-cc86-48df-a4b2-7111a82f455f uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309612025-03-07T23:12:52.033ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5853f5f8-cc86-48df-a4b2-7111a82f455f uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309622025-03-07T23:12:52.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 221 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5853f5f8-cc86-48df-a4b2-7111a82f455f response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309632025-03-07T23:12:52.033ZINFOtest_unauthorized (external client test context): client received response status = 401
309642025-03-07T23:12:52.033ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309652025-03-07T23:12:52.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309662025-03-07T23:12:52.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82208763-f996-4203-a1cf-3ab9e7f117c6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309672025-03-07T23:12:52.033ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82208763-f996-4203-a1cf-3ab9e7f117c6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309682025-03-07T23:12:52.035ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2892:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2911:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82208763-f996-4203-a1cf-3ab9e7f117c6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309692025-03-07T23:12:52.035ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1200 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 82208763-f996-4203-a1cf-3ab9e7f117c6 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309702025-03-07T23:12:52.035ZINFOtest_unauthorized (external client test context): client received response status = 401
309712025-03-07T23:12:52.035ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309722025-03-07T23:12:52.035ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309732025-03-07T23:12:52.035ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309742025-03-07T23:12:52.035ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309752025-03-07T23:12:52.035ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
309762025-03-07T23:12:52.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309772025-03-07T23:12:52.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309782025-03-07T23:12:52.037ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309792025-03-07T23:12:52.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309802025-03-07T23:12:52.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309812025-03-07T23:12:52.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309822025-03-07T23:12:52.045ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
309832025-03-07T23:12:52.045ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309842025-03-07T23:12:52.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309852025-03-07T23:12:52.046ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309862025-03-07T23:12:52.046ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309872025-03-07T23:12:52.047ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309882025-03-07T23:12:52.048ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309892025-03-07T23:12:52.048ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309902025-03-07T23:12:52.049ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309912025-03-07T23:12:52.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
309922025-03-07T23:12:52.058ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
309932025-03-07T23:12:52.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309942025-03-07T23:12:52.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309952025-03-07T23:12:52.058ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309962025-03-07T23:12:52.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
309972025-03-07T23:12:52.059ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309982025-03-07T23:12:52.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309992025-03-07T23:12:52.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310002025-03-07T23:12:52.060ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310012025-03-07T23:12:52.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
310022025-03-07T23:12:52.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310032025-03-07T23:12:52.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310042025-03-07T23:12:52.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310052025-03-07T23:12:52.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
310062025-03-07T23:12:52.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
310072025-03-07T23:12:52.070ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310082025-03-07T23:12:52.071ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310092025-03-07T23:12:52.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310102025-03-07T23:12:52.075ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310112025-03-07T23:12:52.075ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310122025-03-07T23:12:52.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310132025-03-07T23:12:52.079ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310142025-03-07T23:12:52.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310152025-03-07T23:12:52.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310162025-03-07T23:12:52.083ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310172025-03-07T23:12:52.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310182025-03-07T23:12:52.084ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310192025-03-07T23:12:52.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310202025-03-07T23:12:52.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310212025-03-07T23:12:52.084ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310222025-03-07T23:12:52.085ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310232025-03-07T23:12:52.087ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310242025-03-07T23:12:52.087ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310252025-03-07T23:12:52.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310262025-03-07T23:12:52.090ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310272025-03-07T23:12:52.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310282025-03-07T23:12:52.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310292025-03-07T23:12:52.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310302025-03-07T23:12:52.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310312025-03-07T23:12:52.123ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310322025-03-07T23:12:52.127ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 90049 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 01a07149-edd5-4334-9738-04cd94b64af5 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310332025-03-07T23:12:52.131ZINFOtest_unauthorized (external client test context): client received response status = 404
310342025-03-07T23:12:52.131ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310352025-03-07T23:12:52.131ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310362025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 80cac52d-9cb3-491c-9198-beecf8b4f4bc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310372025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 80cac52d-9cb3-491c-9198-beecf8b4f4bc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310382025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 80cac52d-9cb3-491c-9198-beecf8b4f4bc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310392025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 80cac52d-9cb3-491c-9198-beecf8b4f4bc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310402025-03-07T23:12:52.131ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 479 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 80cac52d-9cb3-491c-9198-beecf8b4f4bc response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310412025-03-07T23:12:52.131ZINFOtest_unauthorized (external client test context): client received response status = 401
310422025-03-07T23:12:52.131ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310432025-03-07T23:12:52.131ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310442025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4866add5-4d95-4523-b836-5986a41a5562 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310452025-03-07T23:12:52.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4866add5-4d95-4523-b836-5986a41a5562 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310462025-03-07T23:12:52.132ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4866add5-4d95-4523-b836-5986a41a5562 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310472025-03-07T23:12:52.132ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 273 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4866add5-4d95-4523-b836-5986a41a5562 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310482025-03-07T23:12:52.132ZINFOtest_unauthorized (external client test context): client received response status = 401
310492025-03-07T23:12:52.132ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310502025-03-07T23:12:52.132ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310512025-03-07T23:12:52.132ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d92c865c-4547-4e45-8b64-347790fb6f8a uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310522025-03-07T23:12:52.132ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d92c865c-4547-4e45-8b64-347790fb6f8a uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310532025-03-07T23:12:52.132ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3272:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3292:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d92c865c-4547-4e45-8b64-347790fb6f8a uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310542025-03-07T23:12:52.132ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 969 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d92c865c-4547-4e45-8b64-347790fb6f8a response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310552025-03-07T23:12:52.132ZINFOtest_unauthorized (external client test context): client received response status = 401
310562025-03-07T23:12:52.132ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310572025-03-07T23:12:52.133ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310582025-03-07T23:12:52.133ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c5ca53f4-54fd-4787-9557-78342c897a72 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310592025-03-07T23:12:52.133ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c5ca53f4-54fd-4787-9557-78342c897a72 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310602025-03-07T23:12:52.133ZINFOtest_unauthorized (external client test context): client received response status = 405
310612025-03-07T23:12:52.133ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310622025-03-07T23:12:52.133ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310632025-03-07T23:12:52.133ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cce6c2ef-1bc9-4bb5-a357-1b101852a8f1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310642025-03-07T23:12:52.133ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cce6c2ef-1bc9-4bb5-a357-1b101852a8f1 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310652025-03-07T23:12:52.133ZINFOtest_unauthorized (external client test context): client received response status = 405
310662025-03-07T23:12:52.133ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310672025-03-07T23:12:52.133ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310682025-03-07T23:12:52.133ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c98c4453-bf62-461a-a9cc-0d06b353bdf6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310692025-03-07T23:12:52.133ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c98c4453-bf62-461a-a9cc-0d06b353bdf6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310702025-03-07T23:12:52.134ZINFOtest_unauthorized (external client test context): client received response status = 405
310712025-03-07T23:12:52.134ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310722025-03-07T23:12:52.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310732025-03-07T23:12:52.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f1dd214b-bfdd-4e52-982d-bbd7ec31fed2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310742025-03-07T23:12:52.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f1dd214b-bfdd-4e52-982d-bbd7ec31fed2 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310752025-03-07T23:12:52.134ZINFOtest_unauthorized (external client test context): client received response status = 405
310762025-03-07T23:12:52.134ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310772025-03-07T23:12:52.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310782025-03-07T23:12:52.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310792025-03-07T23:12:52.134ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310802025-03-07T23:12:52.134ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
310812025-03-07T23:12:52.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310822025-03-07T23:12:52.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310832025-03-07T23:12:52.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310842025-03-07T23:12:52.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310852025-03-07T23:12:52.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310862025-03-07T23:12:52.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310872025-03-07T23:12:52.136ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
310882025-03-07T23:12:52.136ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
310892025-03-07T23:12:52.136ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310902025-03-07T23:12:52.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310912025-03-07T23:12:52.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310922025-03-07T23:12:52.143ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
310932025-03-07T23:12:52.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310942025-03-07T23:12:52.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310952025-03-07T23:12:52.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310962025-03-07T23:12:52.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
310972025-03-07T23:12:52.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
310982025-03-07T23:12:52.150ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310992025-03-07T23:12:52.150ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311002025-03-07T23:12:52.150ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311012025-03-07T23:12:52.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
311022025-03-07T23:12:52.152ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
311032025-03-07T23:12:52.152ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311042025-03-07T23:12:52.152ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311052025-03-07T23:12:52.152ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311062025-03-07T23:12:52.166ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
311072025-03-07T23:12:52.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311082025-03-07T23:12:52.167ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311092025-03-07T23:12:52.167ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311102025-03-07T23:12:52.167ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
311112025-03-07T23:12:52.170ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
311122025-03-07T23:12:52.170ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311132025-03-07T23:12:52.170ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311142025-03-07T23:12:52.170ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311152025-03-07T23:12:52.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311162025-03-07T23:12:52.171ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311172025-03-07T23:12:52.174ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311182025-03-07T23:12:52.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311192025-03-07T23:12:52.176ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311202025-03-07T23:12:52.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311212025-03-07T23:12:52.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311222025-03-07T23:12:52.185ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311232025-03-07T23:12:52.185ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311242025-03-07T23:12:52.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311252025-03-07T23:12:52.186ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311262025-03-07T23:12:52.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311272025-03-07T23:12:52.189ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311282025-03-07T23:12:52.190ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311292025-03-07T23:12:52.190ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311302025-03-07T23:12:52.191ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311312025-03-07T23:12:52.196ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311322025-03-07T23:12:52.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311332025-03-07T23:12:52.197ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311342025-03-07T23:12:52.197ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311352025-03-07T23:12:52.199ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311362025-03-07T23:12:52.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311372025-03-07T23:12:52.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 88298 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 79ae5b98-29bc-41ff-b705-cc3cfb99bf06 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311382025-03-07T23:12:52.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
311392025-03-07T23:12:52.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
311402025-03-07T23:12:52.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
311412025-03-07T23:12:52.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
311422025-03-07T23:12:52.224ZINFOtest_unauthorized (external client test context): client received response status = 404
311432025-03-07T23:12:52.224ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311442025-03-07T23:12:52.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311452025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a349add5-c0bc-42db-84c7-db73782af26b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311462025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a349add5-c0bc-42db-84c7-db73782af26b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311472025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a349add5-c0bc-42db-84c7-db73782af26b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311482025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a349add5-c0bc-42db-84c7-db73782af26b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311492025-03-07T23:12:52.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 352 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a349add5-c0bc-42db-84c7-db73782af26b response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311502025-03-07T23:12:52.224ZINFOtest_unauthorized (external client test context): client received response status = 401
311512025-03-07T23:12:52.224ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311522025-03-07T23:12:52.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311532025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bb8eb60a-22a8-4020-be21-9f59369dadfc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311542025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bb8eb60a-22a8-4020-be21-9f59369dadfc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311552025-03-07T23:12:52.224ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bb8eb60a-22a8-4020-be21-9f59369dadfc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311562025-03-07T23:12:52.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 199 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = bb8eb60a-22a8-4020-be21-9f59369dadfc response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311572025-03-07T23:12:52.225ZINFOtest_unauthorized (external client test context): client received response status = 401
311582025-03-07T23:12:52.225ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311592025-03-07T23:12:52.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311602025-03-07T23:12:52.225ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 48fb52a9-154f-4b2d-b9cf-df24dae392b0 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311612025-03-07T23:12:52.225ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 48fb52a9-154f-4b2d-b9cf-df24dae392b0 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311622025-03-07T23:12:52.225ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3303:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3320:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 48fb52a9-154f-4b2d-b9cf-df24dae392b0 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311632025-03-07T23:12:52.225ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 928 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 48fb52a9-154f-4b2d-b9cf-df24dae392b0 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311642025-03-07T23:12:52.225ZINFOtest_unauthorized (external client test context): client received response status = 401
311652025-03-07T23:12:52.226ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311662025-03-07T23:12:52.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311672025-03-07T23:12:52.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 357480a9-b604-4920-be42-bff5d48a6e2c uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311682025-03-07T23:12:52.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 296 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 357480a9-b604-4920-be42-bff5d48a6e2c response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311692025-03-07T23:12:52.227ZINFOtest_unauthorized (external client test context): client received response status = 405
311702025-03-07T23:12:52.227ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311712025-03-07T23:12:52.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311722025-03-07T23:12:52.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 128cc0d2-f1d8-4a95-84e6-69d96e39a508 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311732025-03-07T23:12:52.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 128cc0d2-f1d8-4a95-84e6-69d96e39a508 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311742025-03-07T23:12:52.233ZINFOtest_unauthorized (external client test context): client received response status = 405
311752025-03-07T23:12:52.233ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311762025-03-07T23:12:52.233ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311772025-03-07T23:12:52.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6c051ab-cd07-46ee-8010-2cad55f06e28 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311782025-03-07T23:12:52.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6c051ab-cd07-46ee-8010-2cad55f06e28 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311792025-03-07T23:12:52.233ZINFOtest_unauthorized (external client test context): client received response status = 405
311802025-03-07T23:12:52.233ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311812025-03-07T23:12:52.233ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311822025-03-07T23:12:52.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a874564e-b43a-4050-9e25-b27f57396892 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311832025-03-07T23:12:52.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a874564e-b43a-4050-9e25-b27f57396892 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311842025-03-07T23:12:52.233ZINFOtest_unauthorized (external client test context): client received response status = 405
311852025-03-07T23:12:52.233ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311862025-03-07T23:12:52.236ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311872025-03-07T23:12:52.236ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311882025-03-07T23:12:52.237ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311892025-03-07T23:12:52.237ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
311902025-03-07T23:12:52.237ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311912025-03-07T23:12:52.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311922025-03-07T23:12:52.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311932025-03-07T23:12:52.237ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
311942025-03-07T23:12:52.237ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
311952025-03-07T23:12:52.237ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311962025-03-07T23:12:52.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311972025-03-07T23:12:52.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311982025-03-07T23:12:52.242ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
311992025-03-07T23:12:52.242ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
312002025-03-07T23:12:52.242ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
312012025-03-07T23:12:52.243ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312022025-03-07T23:12:52.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312032025-03-07T23:12:52.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312042025-03-07T23:12:52.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312052025-03-07T23:12:52.243ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312062025-03-07T23:12:52.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312072025-03-07T23:12:52.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312082025-03-07T23:12:52.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312092025-03-07T23:12:52.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312102025-03-07T23:12:52.248ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
312112025-03-07T23:12:52.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312122025-03-07T23:12:52.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312132025-03-07T23:12:52.249ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312142025-03-07T23:12:52.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
312152025-03-07T23:12:52.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312162025-03-07T23:12:52.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312172025-03-07T23:12:52.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312182025-03-07T23:12:52.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312192025-03-07T23:12:52.258ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312202025-03-07T23:12:52.258ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312212025-03-07T23:12:52.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312222025-03-07T23:12:52.259ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312232025-03-07T23:12:52.261ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312242025-03-07T23:12:52.265ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
312252025-03-07T23:12:52.266ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312262025-03-07T23:12:52.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312272025-03-07T23:12:52.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312282025-03-07T23:12:52.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312292025-03-07T23:12:52.269ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312302025-03-07T23:12:52.269ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312312025-03-07T23:12:52.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312322025-03-07T23:12:52.272ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312332025-03-07T23:12:52.272ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312342025-03-07T23:12:52.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312352025-03-07T23:12:52.277ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312362025-03-07T23:12:52.278ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312372025-03-07T23:12:52.278ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312382025-03-07T23:12:52.278ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312392025-03-07T23:12:52.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312402025-03-07T23:12:52.282ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312412025-03-07T23:12:52.284ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312422025-03-07T23:12:52.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312432025-03-07T23:12:52.284ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312442025-03-07T23:12:52.290ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312452025-03-07T23:12:52.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312462025-03-07T23:12:52.290ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312472025-03-07T23:12:52.290ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312482025-03-07T23:12:52.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312492025-03-07T23:12:52.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312502025-03-07T23:12:52.303ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 73559 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4275ba43-fd5a-41cd-a56e-7d6d2d015c32 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
312512025-03-07T23:12:52.304ZINFOtest_unauthorized (external client test context): client received response status = 200
312522025-03-07T23:12:52.304ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312532025-03-07T23:12:52.304ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312542025-03-07T23:12:52.304ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312552025-03-07T23:12:52.304ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312562025-03-07T23:12:52.305ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312572025-03-07T23:12:52.305ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
312582025-03-07T23:12:52.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312592025-03-07T23:12:52.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312602025-03-07T23:12:52.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312612025-03-07T23:12:52.309ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312622025-03-07T23:12:52.309ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312632025-03-07T23:12:52.310ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312642025-03-07T23:12:52.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
312652025-03-07T23:12:52.316ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312662025-03-07T23:12:52.316ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312672025-03-07T23:12:52.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312682025-03-07T23:12:52.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312692025-03-07T23:12:52.323ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
312702025-03-07T23:12:52.324ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312712025-03-07T23:12:52.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312722025-03-07T23:12:52.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312732025-03-07T23:12:52.324ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312742025-03-07T23:12:52.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312752025-03-07T23:12:52.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
312762025-03-07T23:12:52.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312772025-03-07T23:12:52.338ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312782025-03-07T23:12:52.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312792025-03-07T23:12:52.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
312802025-03-07T23:12:52.347ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312812025-03-07T23:12:52.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312822025-03-07T23:12:52.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312832025-03-07T23:12:52.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312842025-03-07T23:12:52.348ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
312852025-03-07T23:12:52.348ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
312862025-03-07T23:12:52.349ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
312872025-03-07T23:12:52.350ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
312882025-03-07T23:12:52.350ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
312892025-03-07T23:12:52.350ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
312902025-03-07T23:12:52.350ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
312912025-03-07T23:12:52.350ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
312922025-03-07T23:12:52.350ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
312932025-03-07T23:12:52.351ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312942025-03-07T23:12:52.352ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312952025-03-07T23:12:52.352ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312962025-03-07T23:12:52.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312972025-03-07T23:12:52.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312982025-03-07T23:12:52.360ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
312992025-03-07T23:12:52.361ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313002025-03-07T23:12:52.361ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313012025-03-07T23:12:52.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313022025-03-07T23:12:52.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313032025-03-07T23:12:52.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313042025-03-07T23:12:52.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313052025-03-07T23:12:52.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313062025-03-07T23:12:52.371ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313072025-03-07T23:12:52.372ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313082025-03-07T23:12:52.372ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313092025-03-07T23:12:52.375ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313102025-03-07T23:12:52.375ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313112025-03-07T23:12:52.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313122025-03-07T23:12:52.376ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313132025-03-07T23:12:52.376ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313142025-03-07T23:12:52.379ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313152025-03-07T23:12:52.379ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313162025-03-07T23:12:52.379ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313172025-03-07T23:12:52.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313182025-03-07T23:12:52.383ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313192025-03-07T23:12:52.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313202025-03-07T23:12:52.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313212025-03-07T23:12:52.385ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313222025-03-07T23:12:52.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313232025-03-07T23:12:52.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313242025-03-07T23:12:52.397ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313252025-03-07T23:12:52.397ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313262025-03-07T23:12:52.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313272025-03-07T23:12:52.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313282025-03-07T23:12:52.399ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313292025-03-07T23:12:52.402ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313302025-03-07T23:12:52.404ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313312025-03-07T23:12:52.404ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313322025-03-07T23:12:52.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313332025-03-07T23:12:52.406ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313342025-03-07T23:12:52.410ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313352025-03-07T23:12:52.410ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313362025-03-07T23:12:52.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313372025-03-07T23:12:52.410ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313382025-03-07T23:12:52.418ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313392025-03-07T23:12:52.418ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313402025-03-07T23:12:52.418ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313412025-03-07T23:12:52.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313422025-03-07T23:12:52.429ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 124539 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b270ae99-cdf4-47a6-bb58-bb3912940085 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313432025-03-07T23:12:52.430ZINFOtest_unauthorized (external client test context): client received response status = 200
313442025-03-07T23:12:52.430ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313452025-03-07T23:12:52.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313462025-03-07T23:12:52.431ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313472025-03-07T23:12:52.432ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313482025-03-07T23:12:52.432ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313492025-03-07T23:12:52.432ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313502025-03-07T23:12:52.432ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313512025-03-07T23:12:52.432ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313522025-03-07T23:12:52.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313532025-03-07T23:12:52.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313542025-03-07T23:12:52.435ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313552025-03-07T23:12:52.438ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
313562025-03-07T23:12:52.439ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
313572025-03-07T23:12:52.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313582025-03-07T23:12:52.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313592025-03-07T23:12:52.439ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313602025-03-07T23:12:52.441ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
313612025-03-07T23:12:52.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313622025-03-07T23:12:52.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313632025-03-07T23:12:52.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313642025-03-07T23:12:52.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
313652025-03-07T23:12:52.453ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
313662025-03-07T23:12:52.453ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313672025-03-07T23:12:52.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313682025-03-07T23:12:52.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313692025-03-07T23:12:52.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
313702025-03-07T23:12:52.458ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
313712025-03-07T23:12:52.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313722025-03-07T23:12:52.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313732025-03-07T23:12:52.459ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313742025-03-07T23:12:52.464ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
313752025-03-07T23:12:52.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313762025-03-07T23:12:52.465ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313772025-03-07T23:12:52.465ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313782025-03-07T23:12:52.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
313792025-03-07T23:12:52.471ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
313802025-03-07T23:12:52.475ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313812025-03-07T23:12:52.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313822025-03-07T23:12:52.477ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313832025-03-07T23:12:52.477ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313842025-03-07T23:12:52.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313852025-03-07T23:12:52.479ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313862025-03-07T23:12:52.479ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313872025-03-07T23:12:52.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313882025-03-07T23:12:52.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313892025-03-07T23:12:52.486ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313902025-03-07T23:12:52.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313912025-03-07T23:12:52.486ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313922025-03-07T23:12:52.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313932025-03-07T23:12:52.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313942025-03-07T23:12:52.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313952025-03-07T23:12:52.493ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313962025-03-07T23:12:52.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313972025-03-07T23:12:52.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313982025-03-07T23:12:52.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
313992025-03-07T23:12:52.496ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314002025-03-07T23:12:52.496ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314012025-03-07T23:12:52.496ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314022025-03-07T23:12:52.497ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314032025-03-07T23:12:52.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314042025-03-07T23:12:52.526ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314052025-03-07T23:12:52.527ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 96198 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1a0b1fea-672e-4211-878b-5fd7ee8e9167 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314062025-03-07T23:12:52.527ZINFOtest_unauthorized (external client test context): client received response status = 404
314072025-03-07T23:12:52.528ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314082025-03-07T23:12:52.528ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314092025-03-07T23:12:52.528ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1815e0aa-811f-4ee3-b0b4-1024474c56db uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314102025-03-07T23:12:52.528ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1815e0aa-811f-4ee3-b0b4-1024474c56db uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314112025-03-07T23:12:52.528ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1815e0aa-811f-4ee3-b0b4-1024474c56db uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314122025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1815e0aa-811f-4ee3-b0b4-1024474c56db uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314132025-03-07T23:12:52.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 482 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1815e0aa-811f-4ee3-b0b4-1024474c56db response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314142025-03-07T23:12:52.530ZINFOtest_unauthorized (external client test context): client received response status = 401
314152025-03-07T23:12:52.530ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314162025-03-07T23:12:52.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314172025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8794ed72-58a0-4002-a245-98e4a1b53486 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314182025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8794ed72-58a0-4002-a245-98e4a1b53486 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314192025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8794ed72-58a0-4002-a245-98e4a1b53486 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314202025-03-07T23:12:52.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 223 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8794ed72-58a0-4002-a245-98e4a1b53486 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314212025-03-07T23:12:52.530ZINFOtest_unauthorized (external client test context): client received response status = 401
314222025-03-07T23:12:52.530ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314232025-03-07T23:12:52.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314242025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c5436692-15b3-40a1-8823-82ce526ca12e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314252025-03-07T23:12:52.530ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c5436692-15b3-40a1-8823-82ce526ca12e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314262025-03-07T23:12:52.531ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2925:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2956:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c5436692-15b3-40a1-8823-82ce526ca12e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314272025-03-07T23:12:52.531ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 914 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c5436692-15b3-40a1-8823-82ce526ca12e response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314282025-03-07T23:12:52.531ZINFOtest_unauthorized (external client test context): client received response status = 401
314292025-03-07T23:12:52.531ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314302025-03-07T23:12:52.531ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314312025-03-07T23:12:52.531ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aeb7ea31-fcf3-44c4-81c1-42c6e8c93e9f uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314322025-03-07T23:12:52.531ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aeb7ea31-fcf3-44c4-81c1-42c6e8c93e9f response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314332025-03-07T23:12:52.531ZINFOtest_unauthorized (external client test context): client received response status = 405
314342025-03-07T23:12:52.532ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314352025-03-07T23:12:52.532ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314362025-03-07T23:12:52.532ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d1bdfaf6-7ffe-40e1-bbde-0667eed7e2a9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314372025-03-07T23:12:52.532ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d1bdfaf6-7ffe-40e1-bbde-0667eed7e2a9 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314382025-03-07T23:12:52.532ZINFOtest_unauthorized (external client test context): client received response status = 405
314392025-03-07T23:12:52.532ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314402025-03-07T23:12:52.532ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314412025-03-07T23:12:52.532ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8b03450d-2272-4c50-b6ba-3cf65c5e4c4e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314422025-03-07T23:12:52.532ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8b03450d-2272-4c50-b6ba-3cf65c5e4c4e response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314432025-03-07T23:12:52.532ZINFOtest_unauthorized (external client test context): client received response status = 405
314442025-03-07T23:12:52.533ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314452025-03-07T23:12:52.533ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314462025-03-07T23:12:52.533ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 72fd5f5a-8cb1-4627-9f86-aae5909774c6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314472025-03-07T23:12:52.533ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 72fd5f5a-8cb1-4627-9f86-aae5909774c6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314482025-03-07T23:12:52.534ZINFOtest_unauthorized (external client test context): client received response status = 405
314492025-03-07T23:12:52.535ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314502025-03-07T23:12:52.535ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314512025-03-07T23:12:52.535ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a21de72-8129-4c04-b811-ef8e389e2c2a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314522025-03-07T23:12:52.535ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7a21de72-8129-4c04-b811-ef8e389e2c2a response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314532025-03-07T23:12:52.535ZINFOtest_unauthorized (external client test context): client received response status = 405
314542025-03-07T23:12:52.536ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314552025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314562025-03-07T23:12:52.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2f6331c8-e8f5-4789-8db9-48a0804a0944 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314572025-03-07T23:12:52.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2f6331c8-e8f5-4789-8db9-48a0804a0944 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314582025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client received response status = 405
314592025-03-07T23:12:52.536ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314602025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314612025-03-07T23:12:52.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3360be86-f71b-4156-927b-b9c3add31a61 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314622025-03-07T23:12:52.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 3360be86-f71b-4156-927b-b9c3add31a61 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314632025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client received response status = 405
314642025-03-07T23:12:52.536ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314652025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314662025-03-07T23:12:52.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6561e579-6756-4181-a714-5715ac2bdd23 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314672025-03-07T23:12:52.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6561e579-6756-4181-a714-5715ac2bdd23 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314682025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client received response status = 405
314692025-03-07T23:12:52.536ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314702025-03-07T23:12:52.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314712025-03-07T23:12:52.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8de156e3-c25b-491a-93b9-ed7cde9f4065 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314722025-03-07T23:12:52.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8de156e3-c25b-491a-93b9-ed7cde9f4065 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314732025-03-07T23:12:52.537ZINFOtest_unauthorized (external client test context): client received response status = 405
314742025-03-07T23:12:52.537ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314752025-03-07T23:12:52.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314762025-03-07T23:12:52.537ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b6c0124d-e17b-449d-861a-fe2cc350dc88 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314772025-03-07T23:12:52.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b6c0124d-e17b-449d-861a-fe2cc350dc88 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314782025-03-07T23:12:52.537ZINFOtest_unauthorized (external client test context): client received response status = 405
314792025-03-07T23:12:52.537ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314802025-03-07T23:12:52.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314812025-03-07T23:12:52.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ba3fdb53-9736-4447-9ba2-4d8f6f62b9b1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314822025-03-07T23:12:52.538ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ba3fdb53-9736-4447-9ba2-4d8f6f62b9b1 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314832025-03-07T23:12:52.538ZINFOtest_unauthorized (external client test context): client received response status = 405
314842025-03-07T23:12:52.538ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314852025-03-07T23:12:52.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314862025-03-07T23:12:52.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 72383786-6a02-4972-89ee-bb7b2f49f7d6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314872025-03-07T23:12:52.538ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 72383786-6a02-4972-89ee-bb7b2f49f7d6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314882025-03-07T23:12:52.538ZINFOtest_unauthorized (external client test context): client received response status = 405
314892025-03-07T23:12:52.539ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314902025-03-07T23:12:52.540ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314912025-03-07T23:12:52.540ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d3d9f174-3cfa-4e74-b8d9-f0658e44b856 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314922025-03-07T23:12:52.540ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d3d9f174-3cfa-4e74-b8d9-f0658e44b856 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314932025-03-07T23:12:52.540ZINFOtest_unauthorized (external client test context): client received response status = 405
314942025-03-07T23:12:52.540ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314952025-03-07T23:12:52.540ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314962025-03-07T23:12:52.540ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 06f9daba-9613-434a-9608-c4c2c4d287b6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314972025-03-07T23:12:52.540ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 06f9daba-9613-434a-9608-c4c2c4d287b6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
314982025-03-07T23:12:52.540ZINFOtest_unauthorized (external client test context): client received response status = 405
314992025-03-07T23:12:52.540ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315002025-03-07T23:12:52.540ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315012025-03-07T23:12:52.540ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a65d37ef-7e44-469d-a52a-9b28eca1d2f5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315022025-03-07T23:12:52.541ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 133 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a65d37ef-7e44-469d-a52a-9b28eca1d2f5 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315032025-03-07T23:12:52.542ZINFOtest_unauthorized (external client test context): client received response status = 405
315042025-03-07T23:12:52.542ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315052025-03-07T23:12:52.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315062025-03-07T23:12:52.542ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c579a589-600b-4726-8432-28251170f104 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315072025-03-07T23:12:52.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c579a589-600b-4726-8432-28251170f104 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315082025-03-07T23:12:52.542ZINFOtest_unauthorized (external client test context): client received response status = 405
315092025-03-07T23:12:52.542ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315102025-03-07T23:12:52.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315112025-03-07T23:12:52.542ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315122025-03-07T23:12:52.542ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315132025-03-07T23:12:52.543ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315142025-03-07T23:12:52.543ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315152025-03-07T23:12:52.543ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315162025-03-07T23:12:52.544ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315172025-03-07T23:12:52.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315182025-03-07T23:12:52.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315192025-03-07T23:12:52.548ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315202025-03-07T23:12:52.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
315212025-03-07T23:12:52.551ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
315222025-03-07T23:12:52.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315232025-03-07T23:12:52.551ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315242025-03-07T23:12:52.552ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315252025-03-07T23:12:52.554ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
315262025-03-07T23:12:52.556ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315272025-03-07T23:12:52.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315282025-03-07T23:12:52.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315292025-03-07T23:12:52.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
315302025-03-07T23:12:52.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
315312025-03-07T23:12:52.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315322025-03-07T23:12:52.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315332025-03-07T23:12:52.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315342025-03-07T23:12:52.577ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
315352025-03-07T23:12:52.577ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
315362025-03-07T23:12:52.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315372025-03-07T23:12:52.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315382025-03-07T23:12:52.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315392025-03-07T23:12:52.579ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
315402025-03-07T23:12:52.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315412025-03-07T23:12:52.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315422025-03-07T23:12:52.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315432025-03-07T23:12:52.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
315442025-03-07T23:12:52.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
315452025-03-07T23:12:52.587ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315462025-03-07T23:12:52.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315472025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315482025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315492025-03-07T23:12:52.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315502025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315512025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315522025-03-07T23:12:52.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315532025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315542025-03-07T23:12:52.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315552025-03-07T23:12:52.588ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315562025-03-07T23:12:52.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315572025-03-07T23:12:52.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315582025-03-07T23:12:52.589ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315592025-03-07T23:12:52.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315602025-03-07T23:12:52.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315612025-03-07T23:12:52.589ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315622025-03-07T23:12:52.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315632025-03-07T23:12:52.590ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315642025-03-07T23:12:52.590ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315652025-03-07T23:12:52.592ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
315662025-03-07T23:12:52.594ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315672025-03-07T23:12:52.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315682025-03-07T23:12:52.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315692025-03-07T23:12:52.594ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315702025-03-07T23:12:52.600ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315712025-03-07T23:12:52.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315722025-03-07T23:12:52.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315732025-03-07T23:12:52.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315742025-03-07T23:12:52.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315752025-03-07T23:12:52.625ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315762025-03-07T23:12:52.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315772025-03-07T23:12:52.625ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315782025-03-07T23:12:52.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315792025-03-07T23:12:52.625ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315802025-03-07T23:12:52.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315812025-03-07T23:12:52.633ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315822025-03-07T23:12:52.633ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315832025-03-07T23:12:52.633ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315842025-03-07T23:12:52.634ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315852025-03-07T23:12:52.638ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315862025-03-07T23:12:52.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315872025-03-07T23:12:52.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315882025-03-07T23:12:52.641ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315892025-03-07T23:12:52.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315902025-03-07T23:12:52.650ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315912025-03-07T23:12:52.650ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315922025-03-07T23:12:52.651ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315932025-03-07T23:12:52.651ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315942025-03-07T23:12:52.660ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 118108 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2ed5d197-06f1-459f-9b87-c0da0dbe633e response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
315952025-03-07T23:12:52.662ZINFOtest_unauthorized (external client test context): client received response status = 200
315962025-03-07T23:12:52.663ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
315972025-03-07T23:12:52.663ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
315982025-03-07T23:12:52.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
315992025-03-07T23:12:52.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316002025-03-07T23:12:52.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316012025-03-07T23:12:52.663ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316022025-03-07T23:12:52.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316032025-03-07T23:12:52.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316042025-03-07T23:12:52.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316052025-03-07T23:12:52.665ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316062025-03-07T23:12:52.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316072025-03-07T23:12:52.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316082025-03-07T23:12:52.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
316092025-03-07T23:12:52.669ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
316102025-03-07T23:12:52.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316112025-03-07T23:12:52.670ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316122025-03-07T23:12:52.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316132025-03-07T23:12:52.673ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
316142025-03-07T23:12:52.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316152025-03-07T23:12:52.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316162025-03-07T23:12:52.674ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316172025-03-07T23:12:52.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
316182025-03-07T23:12:52.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
316192025-03-07T23:12:52.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316202025-03-07T23:12:52.680ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316212025-03-07T23:12:52.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316222025-03-07T23:12:52.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
316232025-03-07T23:12:52.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
316242025-03-07T23:12:52.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316252025-03-07T23:12:52.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316262025-03-07T23:12:52.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316272025-03-07T23:12:52.701ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
316282025-03-07T23:12:52.701ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316292025-03-07T23:12:52.701ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316302025-03-07T23:12:52.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316312025-03-07T23:12:52.705ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
316322025-03-07T23:12:52.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
316332025-03-07T23:12:52.709ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316342025-03-07T23:12:52.709ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316352025-03-07T23:12:52.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316362025-03-07T23:12:52.710ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316372025-03-07T23:12:52.712ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316382025-03-07T23:12:52.712ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316392025-03-07T23:12:52.712ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316402025-03-07T23:12:52.714ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316412025-03-07T23:12:52.715ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316422025-03-07T23:12:52.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316432025-03-07T23:12:52.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316442025-03-07T23:12:52.718ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316452025-03-07T23:12:52.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316462025-03-07T23:12:52.718ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316472025-03-07T23:12:52.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316482025-03-07T23:12:52.722ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316492025-03-07T23:12:52.722ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316502025-03-07T23:12:52.723ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316512025-03-07T23:12:52.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316522025-03-07T23:12:52.726ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316532025-03-07T23:12:52.727ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316542025-03-07T23:12:52.727ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316552025-03-07T23:12:52.727ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316562025-03-07T23:12:52.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316572025-03-07T23:12:52.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316582025-03-07T23:12:52.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316592025-03-07T23:12:52.736ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316602025-03-07T23:12:52.736ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316612025-03-07T23:12:52.738ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316622025-03-07T23:12:52.738ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316632025-03-07T23:12:52.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316642025-03-07T23:12:52.740ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316652025-03-07T23:12:52.740ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316662025-03-07T23:12:52.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316672025-03-07T23:12:52.744ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316682025-03-07T23:12:52.748ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316692025-03-07T23:12:52.748ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316702025-03-07T23:12:52.748ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316712025-03-07T23:12:52.748ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316722025-03-07T23:12:52.749ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316732025-03-07T23:12:52.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316742025-03-07T23:12:52.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316752025-03-07T23:12:52.750ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316762025-03-07T23:12:52.753ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316772025-03-07T23:12:52.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316782025-03-07T23:12:52.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316792025-03-07T23:12:52.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316802025-03-07T23:12:52.757ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316812025-03-07T23:12:52.768ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316822025-03-07T23:12:52.768ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316832025-03-07T23:12:52.768ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316842025-03-07T23:12:52.768ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316852025-03-07T23:12:52.768ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316862025-03-07T23:12:52.769ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316872025-03-07T23:12:52.777ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316882025-03-07T23:12:52.783ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316892025-03-07T23:12:52.783ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316902025-03-07T23:12:52.783ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316912025-03-07T23:12:52.783ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316922025-03-07T23:12:52.783ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316932025-03-07T23:12:52.783ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316942025-03-07T23:12:52.783ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316952025-03-07T23:12:52.793ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316962025-03-07T23:12:52.803ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316972025-03-07T23:12:52.803ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316982025-03-07T23:12:52.803ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
316992025-03-07T23:12:52.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317002025-03-07T23:12:52.814ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 152052 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a4ac822a-d14e-494b-8dcd-b2e3c4e8a60c response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317012025-03-07T23:12:52.816ZINFOtest_unauthorized (external client test context): client received response status = 200
317022025-03-07T23:12:52.816ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317032025-03-07T23:12:52.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317042025-03-07T23:12:52.816ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317052025-03-07T23:12:52.816ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317062025-03-07T23:12:52.816ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317072025-03-07T23:12:52.816ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317082025-03-07T23:12:52.816ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317092025-03-07T23:12:52.816ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317102025-03-07T23:12:52.820ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317112025-03-07T23:12:52.820ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317122025-03-07T23:12:52.821ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317132025-03-07T23:12:52.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
317142025-03-07T23:12:52.823ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
317152025-03-07T23:12:52.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317162025-03-07T23:12:52.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317172025-03-07T23:12:52.824ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317182025-03-07T23:12:52.825ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
317192025-03-07T23:12:52.826ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317202025-03-07T23:12:52.826ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317212025-03-07T23:12:52.826ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317222025-03-07T23:12:52.828ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
317232025-03-07T23:12:52.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
317242025-03-07T23:12:52.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317252025-03-07T23:12:52.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317262025-03-07T23:12:52.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317272025-03-07T23:12:52.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
317282025-03-07T23:12:52.835ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
317292025-03-07T23:12:52.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317302025-03-07T23:12:52.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317312025-03-07T23:12:52.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317322025-03-07T23:12:52.837ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
317332025-03-07T23:12:52.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317342025-03-07T23:12:52.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317352025-03-07T23:12:52.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317362025-03-07T23:12:52.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
317372025-03-07T23:12:52.844ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
317382025-03-07T23:12:52.847ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317392025-03-07T23:12:52.847ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317402025-03-07T23:12:52.847ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317412025-03-07T23:12:52.847ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317422025-03-07T23:12:52.848ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317432025-03-07T23:12:52.848ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317442025-03-07T23:12:52.848ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317452025-03-07T23:12:52.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317462025-03-07T23:12:52.855ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317472025-03-07T23:12:52.855ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317482025-03-07T23:12:52.858ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317492025-03-07T23:12:52.858ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317502025-03-07T23:12:52.859ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317512025-03-07T23:12:52.859ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317522025-03-07T23:12:52.859ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317532025-03-07T23:12:52.862ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317542025-03-07T23:12:52.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317552025-03-07T23:12:52.864ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317562025-03-07T23:12:52.864ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317572025-03-07T23:12:52.868ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317582025-03-07T23:12:52.870ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317592025-03-07T23:12:52.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317602025-03-07T23:12:52.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317612025-03-07T23:12:52.872ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317622025-03-07T23:12:52.882ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317632025-03-07T23:12:52.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 66748 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0af3ed41-b325-445c-b9ee-f599bda666fb response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317642025-03-07T23:12:52.883ZINFOtest_unauthorized (external client test context): client received response status = 404
317652025-03-07T23:12:52.883ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317662025-03-07T23:12:52.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317672025-03-07T23:12:52.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b20094f9-4e34-487b-9fda-a56bcdcdf2bf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317682025-03-07T23:12:52.883ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b20094f9-4e34-487b-9fda-a56bcdcdf2bf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317692025-03-07T23:12:52.883ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b20094f9-4e34-487b-9fda-a56bcdcdf2bf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317702025-03-07T23:12:52.883ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b20094f9-4e34-487b-9fda-a56bcdcdf2bf uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317712025-03-07T23:12:52.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 356 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b20094f9-4e34-487b-9fda-a56bcdcdf2bf response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317722025-03-07T23:12:52.883ZINFOtest_unauthorized (external client test context): client received response status = 401
317732025-03-07T23:12:52.884ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317742025-03-07T23:12:52.884ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317752025-03-07T23:12:52.884ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d89f5d0-dd59-4fb1-9f75-bd5b2c0aef16 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317762025-03-07T23:12:52.884ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d89f5d0-dd59-4fb1-9f75-bd5b2c0aef16 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317772025-03-07T23:12:52.884ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d89f5d0-dd59-4fb1-9f75-bd5b2c0aef16 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317782025-03-07T23:12:52.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 204 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7d89f5d0-dd59-4fb1-9f75-bd5b2c0aef16 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317792025-03-07T23:12:52.885ZINFOtest_unauthorized (external client test context): client received response status = 401
317802025-03-07T23:12:52.885ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317812025-03-07T23:12:52.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317822025-03-07T23:12:52.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72117967-1854-4b3d-b626-1a8f6bd148ad uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317832025-03-07T23:12:52.885ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72117967-1854-4b3d-b626-1a8f6bd148ad uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317842025-03-07T23:12:52.888ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2969:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3002:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72117967-1854-4b3d-b626-1a8f6bd148ad uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317852025-03-07T23:12:52.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 932 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 72117967-1854-4b3d-b626-1a8f6bd148ad response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317862025-03-07T23:12:52.888ZINFOtest_unauthorized (external client test context): client received response status = 401
317872025-03-07T23:12:52.888ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317882025-03-07T23:12:52.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317892025-03-07T23:12:52.888ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7d5e1f2c-7d41-459c-8bc4-23dd0bfd4002 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317902025-03-07T23:12:52.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 7d5e1f2c-7d41-459c-8bc4-23dd0bfd4002 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317912025-03-07T23:12:52.888ZINFOtest_unauthorized (external client test context): client received response status = 405
317922025-03-07T23:12:52.888ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317932025-03-07T23:12:52.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317942025-03-07T23:12:52.888ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 607ba56a-26a7-43e5-bb0b-40ff430b2db5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317952025-03-07T23:12:52.889ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 607ba56a-26a7-43e5-bb0b-40ff430b2db5 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317962025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client received response status = 405
317972025-03-07T23:12:52.891ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317982025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
317992025-03-07T23:12:52.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e869c5ea-d7a8-4988-ba64-9e33b245a748 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318002025-03-07T23:12:52.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = e869c5ea-d7a8-4988-ba64-9e33b245a748 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318012025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client received response status = 405
318022025-03-07T23:12:52.891ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318032025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318042025-03-07T23:12:52.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4026155e-4d9e-423b-8cd0-5decbe002a8b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318052025-03-07T23:12:52.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4026155e-4d9e-423b-8cd0-5decbe002a8b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318062025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client received response status = 405
318072025-03-07T23:12:52.891ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318082025-03-07T23:12:52.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318092025-03-07T23:12:52.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318102025-03-07T23:12:52.891ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318112025-03-07T23:12:52.891ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318122025-03-07T23:12:52.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318132025-03-07T23:12:52.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318142025-03-07T23:12:52.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318152025-03-07T23:12:52.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318162025-03-07T23:12:52.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318172025-03-07T23:12:52.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318182025-03-07T23:12:52.898ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
318192025-03-07T23:12:52.898ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
318202025-03-07T23:12:52.898ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318212025-03-07T23:12:52.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318222025-03-07T23:12:52.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318232025-03-07T23:12:52.899ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
318242025-03-07T23:12:52.899ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318252025-03-07T23:12:52.899ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318262025-03-07T23:12:52.899ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318272025-03-07T23:12:52.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
318282025-03-07T23:12:52.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
318292025-03-07T23:12:52.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318302025-03-07T23:12:52.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318312025-03-07T23:12:52.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318322025-03-07T23:12:52.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
318332025-03-07T23:12:52.912ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
318342025-03-07T23:12:52.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318352025-03-07T23:12:52.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318362025-03-07T23:12:52.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318372025-03-07T23:12:52.913ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
318382025-03-07T23:12:52.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318392025-03-07T23:12:52.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318402025-03-07T23:12:52.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318412025-03-07T23:12:52.916ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
318422025-03-07T23:12:52.920ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
318432025-03-07T23:12:52.920ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318442025-03-07T23:12:52.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318452025-03-07T23:12:52.921ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318462025-03-07T23:12:52.923ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318472025-03-07T23:12:52.928ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318482025-03-07T23:12:52.929ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318492025-03-07T23:12:52.930ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318502025-03-07T23:12:52.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318512025-03-07T23:12:52.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318522025-03-07T23:12:52.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318532025-03-07T23:12:52.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318542025-03-07T23:12:52.935ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318552025-03-07T23:12:52.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318562025-03-07T23:12:52.935ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318572025-03-07T23:12:52.936ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318582025-03-07T23:12:52.938ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318592025-03-07T23:12:52.939ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318602025-03-07T23:12:52.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318612025-03-07T23:12:52.940ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318622025-03-07T23:12:52.943ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318632025-03-07T23:12:52.943ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318642025-03-07T23:12:52.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318652025-03-07T23:12:52.944ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318662025-03-07T23:12:52.947ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318672025-03-07T23:12:52.965ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318682025-03-07T23:12:52.965ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 76844 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 26dd1929-af36-41e4-afca-6ae6faaf4d7a response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318692025-03-07T23:12:52.966ZINFOtest_unauthorized (external client test context): client received response status = 404
318702025-03-07T23:12:52.966ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318712025-03-07T23:12:52.967ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318722025-03-07T23:12:52.967ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 105c7d79-20a2-4525-b57d-642983591f78 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318732025-03-07T23:12:52.967ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 105c7d79-20a2-4525-b57d-642983591f78 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318742025-03-07T23:12:52.967ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 105c7d79-20a2-4525-b57d-642983591f78 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318752025-03-07T23:12:52.967ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 105c7d79-20a2-4525-b57d-642983591f78 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318762025-03-07T23:12:52.969ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 402 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 105c7d79-20a2-4525-b57d-642983591f78 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318772025-03-07T23:12:52.969ZINFOtest_unauthorized (external client test context): client received response status = 401
318782025-03-07T23:12:52.969ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318792025-03-07T23:12:52.969ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318802025-03-07T23:12:52.969ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 90b9bc31-30d7-4a51-a1a3-8d9ccfb5fe33 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318812025-03-07T23:12:52.969ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 90b9bc31-30d7-4a51-a1a3-8d9ccfb5fe33 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318822025-03-07T23:12:52.970ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 90b9bc31-30d7-4a51-a1a3-8d9ccfb5fe33 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318832025-03-07T23:12:52.970ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 223 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 90b9bc31-30d7-4a51-a1a3-8d9ccfb5fe33 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318842025-03-07T23:12:52.970ZINFOtest_unauthorized (external client test context): client received response status = 401
318852025-03-07T23:12:52.970ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318862025-03-07T23:12:52.970ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318872025-03-07T23:12:52.970ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96a68ff9-41af-4645-8a2b-98d8e0dbfd19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318882025-03-07T23:12:52.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96a68ff9-41af-4645-8a2b-98d8e0dbfd19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318892025-03-07T23:12:52.974ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3013:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3047:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96a68ff9-41af-4645-8a2b-98d8e0dbfd19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318902025-03-07T23:12:52.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1068 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 96a68ff9-41af-4645-8a2b-98d8e0dbfd19 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318912025-03-07T23:12:52.975ZINFOtest_unauthorized (external client test context): client received response status = 401
318922025-03-07T23:12:52.975ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318932025-03-07T23:12:52.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318942025-03-07T23:12:52.975ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318952025-03-07T23:12:52.975ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318962025-03-07T23:12:52.975ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
318972025-03-07T23:12:52.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318982025-03-07T23:12:52.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318992025-03-07T23:12:52.975ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319002025-03-07T23:12:52.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319012025-03-07T23:12:52.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319022025-03-07T23:12:52.975ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319032025-03-07T23:12:52.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
319042025-03-07T23:12:52.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
319052025-03-07T23:12:52.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319062025-03-07T23:12:52.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319072025-03-07T23:12:52.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319082025-03-07T23:12:52.979ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
319092025-03-07T23:12:52.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319102025-03-07T23:12:52.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319112025-03-07T23:12:52.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319122025-03-07T23:12:52.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
319132025-03-07T23:12:52.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
319142025-03-07T23:12:52.992ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319152025-03-07T23:12:52.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319162025-03-07T23:12:52.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319172025-03-07T23:12:52.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
319182025-03-07T23:12:52.993ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
319192025-03-07T23:12:52.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319202025-03-07T23:12:52.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319212025-03-07T23:12:52.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319222025-03-07T23:12:52.996ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
319232025-03-07T23:12:52.996ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319242025-03-07T23:12:52.996ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319252025-03-07T23:12:52.997ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319262025-03-07T23:12:52.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
319272025-03-07T23:12:53.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
319282025-03-07T23:12:53.002ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319292025-03-07T23:12:53.002ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319302025-03-07T23:12:53.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319312025-03-07T23:12:53.003ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319322025-03-07T23:12:53.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319332025-03-07T23:12:53.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319342025-03-07T23:12:53.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319352025-03-07T23:12:53.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319362025-03-07T23:12:53.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319372025-03-07T23:12:53.009ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319382025-03-07T23:12:53.011ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319392025-03-07T23:12:53.011ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319402025-03-07T23:12:53.011ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319412025-03-07T23:12:53.011ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319422025-03-07T23:12:53.012ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319432025-03-07T23:12:53.014ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319442025-03-07T23:12:53.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319452025-03-07T23:12:53.016ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319462025-03-07T23:12:53.016ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319472025-03-07T23:12:53.018ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319482025-03-07T23:12:53.018ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319492025-03-07T23:12:53.018ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319502025-03-07T23:12:53.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319512025-03-07T23:12:53.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319522025-03-07T23:12:53.038ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319532025-03-07T23:12:53.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 68107 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 59387123-92ef-420e-aa9f-8961b7eedb75 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319542025-03-07T23:12:53.040ZINFOtest_unauthorized (external client test context): client received response status = 404
319552025-03-07T23:12:53.040ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319562025-03-07T23:12:53.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319572025-03-07T23:12:53.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5eae0a54-7906-4f93-a300-aaf75c57d35d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319582025-03-07T23:12:53.040ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5eae0a54-7906-4f93-a300-aaf75c57d35d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319592025-03-07T23:12:53.041ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5eae0a54-7906-4f93-a300-aaf75c57d35d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319602025-03-07T23:12:53.041ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5eae0a54-7906-4f93-a300-aaf75c57d35d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319612025-03-07T23:12:53.042ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 470 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5eae0a54-7906-4f93-a300-aaf75c57d35d response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319622025-03-07T23:12:53.042ZINFOtest_unauthorized (external client test context): client received response status = 401
319632025-03-07T23:12:53.042ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319642025-03-07T23:12:53.042ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319652025-03-07T23:12:53.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b165c4fc-52a7-41d1-95a4-96628c560880 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319662025-03-07T23:12:53.043ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b165c4fc-52a7-41d1-95a4-96628c560880 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319672025-03-07T23:12:53.043ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b165c4fc-52a7-41d1-95a4-96628c560880 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319682025-03-07T23:12:53.043ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 217 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b165c4fc-52a7-41d1-95a4-96628c560880 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319692025-03-07T23:12:53.043ZINFOtest_unauthorized (external client test context): client received response status = 401
319702025-03-07T23:12:53.043ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319712025-03-07T23:12:53.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319722025-03-07T23:12:53.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a43e2a3-b326-4a71-bd28-b21ff0ecfeba uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319732025-03-07T23:12:53.045ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a43e2a3-b326-4a71-bd28-b21ff0ecfeba uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319742025-03-07T23:12:53.045ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3058:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3092:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a43e2a3-b326-4a71-bd28-b21ff0ecfeba uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319752025-03-07T23:12:53.045ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 807 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1a43e2a3-b326-4a71-bd28-b21ff0ecfeba response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319762025-03-07T23:12:53.045ZINFOtest_unauthorized (external client test context): client received response status = 401
319772025-03-07T23:12:53.045ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319782025-03-07T23:12:53.045ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319792025-03-07T23:12:53.045ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a7f7304e-7d60-4962-b8c6-3f61142abbc6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319802025-03-07T23:12:53.045ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 245 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a7f7304e-7d60-4962-b8c6-3f61142abbc6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319812025-03-07T23:12:53.045ZINFOtest_unauthorized (external client test context): client received response status = 405
319822025-03-07T23:12:53.045ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319832025-03-07T23:12:53.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319842025-03-07T23:12:53.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9dcb5c98-4e81-4446-aba6-7ac9867a0a10 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319852025-03-07T23:12:53.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9dcb5c98-4e81-4446-aba6-7ac9867a0a10 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319862025-03-07T23:12:53.048ZINFOtest_unauthorized (external client test context): client received response status = 405
319872025-03-07T23:12:53.048ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319882025-03-07T23:12:53.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319892025-03-07T23:12:53.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bc25bfd7-c2bb-4abe-9751-5e04276ae10d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319902025-03-07T23:12:53.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bc25bfd7-c2bb-4abe-9751-5e04276ae10d response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319912025-03-07T23:12:53.048ZINFOtest_unauthorized (external client test context): client received response status = 405
319922025-03-07T23:12:53.048ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319932025-03-07T23:12:53.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319942025-03-07T23:12:53.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bf926228-54ff-486f-8f8f-e489e6eb2b3b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319952025-03-07T23:12:53.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bf926228-54ff-486f-8f8f-e489e6eb2b3b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319962025-03-07T23:12:53.049ZINFOtest_unauthorized (external client test context): client received response status = 405
319972025-03-07T23:12:53.049ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319982025-03-07T23:12:53.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
319992025-03-07T23:12:53.049ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320002025-03-07T23:12:53.049ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320012025-03-07T23:12:53.049ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320022025-03-07T23:12:53.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320032025-03-07T23:12:53.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320042025-03-07T23:12:53.049ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320052025-03-07T23:12:53.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320062025-03-07T23:12:53.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320072025-03-07T23:12:53.050ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320082025-03-07T23:12:53.052ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
320092025-03-07T23:12:53.053ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
320102025-03-07T23:12:53.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320112025-03-07T23:12:53.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320122025-03-07T23:12:53.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320132025-03-07T23:12:53.055ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
320142025-03-07T23:12:53.057ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320152025-03-07T23:12:53.057ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320162025-03-07T23:12:53.057ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320172025-03-07T23:12:53.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
320182025-03-07T23:12:53.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
320192025-03-07T23:12:53.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320202025-03-07T23:12:53.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320212025-03-07T23:12:53.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320222025-03-07T23:12:53.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
320232025-03-07T23:12:53.066ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
320242025-03-07T23:12:53.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320252025-03-07T23:12:53.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320262025-03-07T23:12:53.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320272025-03-07T23:12:53.068ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
320282025-03-07T23:12:53.068ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320292025-03-07T23:12:53.068ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320302025-03-07T23:12:53.069ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320312025-03-07T23:12:53.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
320322025-03-07T23:12:53.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
320332025-03-07T23:12:53.080ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320342025-03-07T23:12:53.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320352025-03-07T23:12:53.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320362025-03-07T23:12:53.081ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320372025-03-07T23:12:53.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320382025-03-07T23:12:53.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320392025-03-07T23:12:53.084ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320402025-03-07T23:12:53.086ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320412025-03-07T23:12:53.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320422025-03-07T23:12:53.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320432025-03-07T23:12:53.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320442025-03-07T23:12:53.089ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320452025-03-07T23:12:53.089ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320462025-03-07T23:12:53.089ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320472025-03-07T23:12:53.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320482025-03-07T23:12:53.092ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320492025-03-07T23:12:53.092ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320502025-03-07T23:12:53.092ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320512025-03-07T23:12:53.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320522025-03-07T23:12:53.097ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320532025-03-07T23:12:53.098ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320542025-03-07T23:12:53.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320552025-03-07T23:12:53.098ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320562025-03-07T23:12:53.103ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320572025-03-07T23:12:53.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320582025-03-07T23:12:53.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320592025-03-07T23:12:53.113ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320602025-03-07T23:12:53.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320612025-03-07T23:12:53.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320622025-03-07T23:12:53.115ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320632025-03-07T23:12:53.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320642025-03-07T23:12:53.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320652025-03-07T23:12:53.117ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320662025-03-07T23:12:53.118ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320672025-03-07T23:12:53.120ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320682025-03-07T23:12:53.120ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320692025-03-07T23:12:53.122ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320702025-03-07T23:12:53.122ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320712025-03-07T23:12:53.122ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320722025-03-07T23:12:53.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320732025-03-07T23:12:53.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320742025-03-07T23:12:53.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320752025-03-07T23:12:53.125ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320762025-03-07T23:12:53.133ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320772025-03-07T23:12:53.134ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320782025-03-07T23:12:53.134ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320792025-03-07T23:12:53.135ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320802025-03-07T23:12:53.141ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320812025-03-07T23:12:53.148ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f5e6be3a-daae-4e2c-80f6-bf3f1e24bc0a, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320822025-03-07T23:12:53.148ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320832025-03-07T23:12:53.148ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320842025-03-07T23:12:53.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320852025-03-07T23:12:53.149ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320862025-03-07T23:12:53.149ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320872025-03-07T23:12:53.153ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320882025-03-07T23:12:53.154ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320892025-03-07T23:12:53.154ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320902025-03-07T23:12:53.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320912025-03-07T23:12:53.159ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320922025-03-07T23:12:53.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320932025-03-07T23:12:53.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320942025-03-07T23:12:53.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320952025-03-07T23:12:53.171ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320962025-03-07T23:12:53.180ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320972025-03-07T23:12:53.181ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320982025-03-07T23:12:53.181ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
320992025-03-07T23:12:53.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
321002025-03-07T23:12:53.193ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 147794 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b581d2b4-f1a8-40bd-9552-549ce1cb80fd response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
321012025-03-07T23:12:53.194ZINFOtest_unauthorized (external client test context): client received response status = 200
321022025-03-07T23:12:53.195ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321032025-03-07T23:12:53.195ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321042025-03-07T23:12:53.195ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321052025-03-07T23:12:53.195ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321062025-03-07T23:12:53.195ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321072025-03-07T23:12:53.195ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321082025-03-07T23:12:53.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321092025-03-07T23:12:53.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321102025-03-07T23:12:53.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321112025-03-07T23:12:53.210ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321122025-03-07T23:12:53.211ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321132025-03-07T23:12:53.211ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321142025-03-07T23:12:53.214ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
321152025-03-07T23:12:53.214ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
321162025-03-07T23:12:53.214ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321172025-03-07T23:12:53.214ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321182025-03-07T23:12:53.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321192025-03-07T23:12:53.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
321202025-03-07T23:12:53.219ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
321212025-03-07T23:12:53.219ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
321222025-03-07T23:12:53.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
321232025-03-07T23:12:53.221ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
321242025-03-07T23:12:53.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321252025-03-07T23:12:53.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321262025-03-07T23:12:53.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321272025-03-07T23:12:53.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
321282025-03-07T23:12:53.228ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
321292025-03-07T23:12:53.229ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321302025-03-07T23:12:53.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321312025-03-07T23:12:53.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321322025-03-07T23:12:53.230ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
321332025-03-07T23:12:53.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
321342025-03-07T23:12:53.233ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
321352025-03-07T23:12:53.234ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
321362025-03-07T23:12:53.236ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321372025-03-07T23:12:53.236ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321382025-03-07T23:12:53.236ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321392025-03-07T23:12:53.238ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
321402025-03-07T23:12:53.238ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
321412025-03-07T23:12:53.238ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
321422025-03-07T23:12:53.238ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321432025-03-07T23:12:53.238ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321442025-03-07T23:12:53.238ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321452025-03-07T23:12:53.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
321462025-03-07T23:12:53.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
321472025-03-07T23:12:53.244ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321482025-03-07T23:12:53.244ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321492025-03-07T23:12:53.244ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321502025-03-07T23:12:53.245ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321512025-03-07T23:12:53.247ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321522025-03-07T23:12:53.247ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321532025-03-07T23:12:53.247ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321542025-03-07T23:12:53.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321552025-03-07T23:12:53.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321562025-03-07T23:12:53.250ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321572025-03-07T23:12:53.252ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321582025-03-07T23:12:53.252ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321592025-03-07T23:12:53.252ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321602025-03-07T23:12:53.252ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321612025-03-07T23:12:53.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321622025-03-07T23:12:53.255ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321632025-03-07T23:12:53.255ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321642025-03-07T23:12:53.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321652025-03-07T23:12:53.256ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321662025-03-07T23:12:53.258ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321672025-03-07T23:12:53.258ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321682025-03-07T23:12:53.259ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321692025-03-07T23:12:53.259ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321702025-03-07T23:12:53.264ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321712025-03-07T23:12:53.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321722025-03-07T23:12:53.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321732025-03-07T23:12:53.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321742025-03-07T23:12:53.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321752025-03-07T23:12:53.275ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321762025-03-07T23:12:53.275ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321772025-03-07T23:12:53.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321782025-03-07T23:12:53.278ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321792025-03-07T23:12:53.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321802025-03-07T23:12:53.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321812025-03-07T23:12:53.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321822025-03-07T23:12:53.281ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321832025-03-07T23:12:53.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321842025-03-07T23:12:53.281ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321852025-03-07T23:12:53.282ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321862025-03-07T23:12:53.285ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321872025-03-07T23:12:53.288ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321882025-03-07T23:12:53.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321892025-03-07T23:12:53.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321902025-03-07T23:12:53.293ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321912025-03-07T23:12:53.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321922025-03-07T23:12:53.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321932025-03-07T23:12:53.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321942025-03-07T23:12:53.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321952025-03-07T23:12:53.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321962025-03-07T23:12:53.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321972025-03-07T23:12:53.306ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321982025-03-07T23:12:53.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
321992025-03-07T23:12:53.306ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322002025-03-07T23:12:53.307ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322012025-03-07T23:12:53.308ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322022025-03-07T23:12:53.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322032025-03-07T23:12:53.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322042025-03-07T23:12:53.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322052025-03-07T23:12:53.312ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322062025-03-07T23:12:53.315ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322072025-03-07T23:12:53.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322082025-03-07T23:12:53.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322092025-03-07T23:12:53.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322102025-03-07T23:12:53.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322112025-03-07T23:12:53.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322122025-03-07T23:12:53.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322132025-03-07T23:12:53.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322142025-03-07T23:12:53.322ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
322152025-03-07T23:12:53.324ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 129652 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5de9ab31-addc-4070-b54c-d8a48c4d57a8 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322162025-03-07T23:12:53.327ZINFOtest_unauthorized (external client test context): client received response status = 200
322172025-03-07T23:12:53.327ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322182025-03-07T23:12:53.327ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322192025-03-07T23:12:53.327ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322202025-03-07T23:12:53.327ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322212025-03-07T23:12:53.327ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322222025-03-07T23:12:53.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322232025-03-07T23:12:53.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322242025-03-07T23:12:53.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322252025-03-07T23:12:53.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322262025-03-07T23:12:53.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322272025-03-07T23:12:53.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322282025-03-07T23:12:53.329ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
322292025-03-07T23:12:53.332ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
322302025-03-07T23:12:53.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322312025-03-07T23:12:53.332ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322322025-03-07T23:12:53.332ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322332025-03-07T23:12:53.332ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
322342025-03-07T23:12:53.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322352025-03-07T23:12:53.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322362025-03-07T23:12:53.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322372025-03-07T23:12:53.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
322382025-03-07T23:12:53.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
322392025-03-07T23:12:53.336ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322402025-03-07T23:12:53.336ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322412025-03-07T23:12:53.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322422025-03-07T23:12:53.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
322432025-03-07T23:12:53.339ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
322442025-03-07T23:12:53.340ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322452025-03-07T23:12:53.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322462025-03-07T23:12:53.340ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322472025-03-07T23:12:53.340ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
322482025-03-07T23:12:53.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322492025-03-07T23:12:53.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322502025-03-07T23:12:53.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322512025-03-07T23:12:53.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
322522025-03-07T23:12:53.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
322532025-03-07T23:12:53.345ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322542025-03-07T23:12:53.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322552025-03-07T23:12:53.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322562025-03-07T23:12:53.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322572025-03-07T23:12:53.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322582025-03-07T23:12:53.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322592025-03-07T23:12:53.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322602025-03-07T23:12:53.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322612025-03-07T23:12:53.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322622025-03-07T23:12:53.353ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322632025-03-07T23:12:53.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322642025-03-07T23:12:53.353ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322652025-03-07T23:12:53.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322662025-03-07T23:12:53.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322672025-03-07T23:12:53.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322682025-03-07T23:12:53.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322692025-03-07T23:12:53.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322702025-03-07T23:12:53.356ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322712025-03-07T23:12:53.357ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322722025-03-07T23:12:53.363ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322732025-03-07T23:12:53.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322742025-03-07T23:12:53.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322752025-03-07T23:12:53.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322762025-03-07T23:12:53.378ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322772025-03-07T23:12:53.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322782025-03-07T23:12:53.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 64447 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3313cb21-6796-4cbf-9fba-02270c741b03 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322792025-03-07T23:12:53.390ZINFOtest_unauthorized (external client test context): client received response status = 404
322802025-03-07T23:12:53.390ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322812025-03-07T23:12:53.391ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322822025-03-07T23:12:53.391ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2344cae9-a2cd-4a4e-b936-8153f1b7d2cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322832025-03-07T23:12:53.391ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2344cae9-a2cd-4a4e-b936-8153f1b7d2cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322842025-03-07T23:12:53.393ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2344cae9-a2cd-4a4e-b936-8153f1b7d2cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322852025-03-07T23:12:53.393ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2344cae9-a2cd-4a4e-b936-8153f1b7d2cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322862025-03-07T23:12:53.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 655 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 2344cae9-a2cd-4a4e-b936-8153f1b7d2cc response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322872025-03-07T23:12:53.394ZINFOtest_unauthorized (external client test context): client received response status = 401
322882025-03-07T23:12:53.394ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322892025-03-07T23:12:53.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322902025-03-07T23:12:53.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9f2efd8e-f2c6-4d5a-b7b2-8abee019b99d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322912025-03-07T23:12:53.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9f2efd8e-f2c6-4d5a-b7b2-8abee019b99d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322922025-03-07T23:12:53.394ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9f2efd8e-f2c6-4d5a-b7b2-8abee019b99d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322932025-03-07T23:12:53.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 224 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9f2efd8e-f2c6-4d5a-b7b2-8abee019b99d response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322942025-03-07T23:12:53.394ZINFOtest_unauthorized (external client test context): client received response status = 401
322952025-03-07T23:12:53.394ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322962025-03-07T23:12:53.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322972025-03-07T23:12:53.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f5b66d98-0094-4fd5-b207-e048953205d4 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322982025-03-07T23:12:53.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f5b66d98-0094-4fd5-b207-e048953205d4 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
322992025-03-07T23:12:53.395ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3105:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3138:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f5b66d98-0094-4fd5-b207-e048953205d4 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323002025-03-07T23:12:53.395ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2022 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f5b66d98-0094-4fd5-b207-e048953205d4 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323012025-03-07T23:12:53.396ZINFOtest_unauthorized (external client test context): client received response status = 401
323022025-03-07T23:12:53.396ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323032025-03-07T23:12:53.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323042025-03-07T23:12:53.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 99d85e09-66ea-467f-b357-90f22fedbcad uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323052025-03-07T23:12:53.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 183 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 99d85e09-66ea-467f-b357-90f22fedbcad response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323062025-03-07T23:12:53.397ZINFOtest_unauthorized (external client test context): client received response status = 405
323072025-03-07T23:12:53.397ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323082025-03-07T23:12:53.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323092025-03-07T23:12:53.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 14e2fd76-25d7-4d82-8ac4-436d5a93bcf9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323102025-03-07T23:12:53.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 14e2fd76-25d7-4d82-8ac4-436d5a93bcf9 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323112025-03-07T23:12:53.398ZINFOtest_unauthorized (external client test context): client received response status = 405
323122025-03-07T23:12:53.398ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323132025-03-07T23:12:53.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323142025-03-07T23:12:53.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 03e5b9ba-13e4-4095-a706-530d9136bcdb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323152025-03-07T23:12:53.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 03e5b9ba-13e4-4095-a706-530d9136bcdb response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323162025-03-07T23:12:53.398ZINFOtest_unauthorized (external client test context): client received response status = 405
323172025-03-07T23:12:53.398ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323182025-03-07T23:12:53.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323192025-03-07T23:12:53.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 87b34fbc-4d93-40f5-a7ac-6075c10f4692 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323202025-03-07T23:12:53.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 166 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 87b34fbc-4d93-40f5-a7ac-6075c10f4692 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323212025-03-07T23:12:53.400ZINFOtest_unauthorized (external client test context): client received response status = 405
323222025-03-07T23:12:53.400ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323232025-03-07T23:12:53.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323242025-03-07T23:12:53.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323252025-03-07T23:12:53.400ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323262025-03-07T23:12:53.400ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323272025-03-07T23:12:53.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323282025-03-07T23:12:53.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323292025-03-07T23:12:53.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323302025-03-07T23:12:53.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323312025-03-07T23:12:53.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323322025-03-07T23:12:53.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323332025-03-07T23:12:53.409ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
323342025-03-07T23:12:53.409ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
323352025-03-07T23:12:53.409ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323362025-03-07T23:12:53.409ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323372025-03-07T23:12:53.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323382025-03-07T23:12:53.415ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
323392025-03-07T23:12:53.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323402025-03-07T23:12:53.417ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323412025-03-07T23:12:53.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323422025-03-07T23:12:53.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
323432025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
323442025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323452025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323462025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323472025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
323482025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
323492025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323502025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323512025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323522025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
323532025-03-07T23:12:53.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323542025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323552025-03-07T23:12:53.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323562025-03-07T23:12:53.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
323572025-03-07T23:12:53.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
323582025-03-07T23:12:53.433ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323592025-03-07T23:12:53.434ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323602025-03-07T23:12:53.434ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323612025-03-07T23:12:53.434ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323622025-03-07T23:12:53.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323632025-03-07T23:12:53.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323642025-03-07T23:12:53.438ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323652025-03-07T23:12:53.465ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323662025-03-07T23:12:53.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323672025-03-07T23:12:53.466ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323682025-03-07T23:12:53.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323692025-03-07T23:12:53.483ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323702025-03-07T23:12:53.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323712025-03-07T23:12:53.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323722025-03-07T23:12:53.486ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323732025-03-07T23:12:53.490ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323742025-03-07T23:12:53.490ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323752025-03-07T23:12:53.491ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323762025-03-07T23:12:53.498ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323772025-03-07T23:12:53.503ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323782025-03-07T23:12:53.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323792025-03-07T23:12:53.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323802025-03-07T23:12:53.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323812025-03-07T23:12:53.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323822025-03-07T23:12:53.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323832025-03-07T23:12:53.533ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 133577 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ae84367e-87f4-4160-a7f4-ccc63ba1dc19 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323842025-03-07T23:12:53.534ZINFOtest_unauthorized (external client test context): client received response status = 404
323852025-03-07T23:12:53.534ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323862025-03-07T23:12:53.534ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323872025-03-07T23:12:53.535ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fa8201d-3797-44dd-ad98-52e15ebd88c9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323882025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fa8201d-3797-44dd-ad98-52e15ebd88c9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323892025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fa8201d-3797-44dd-ad98-52e15ebd88c9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323902025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fa8201d-3797-44dd-ad98-52e15ebd88c9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323912025-03-07T23:12:53.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 492 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2fa8201d-3797-44dd-ad98-52e15ebd88c9 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323922025-03-07T23:12:53.537ZINFOtest_unauthorized (external client test context): client received response status = 401
323932025-03-07T23:12:53.537ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323942025-03-07T23:12:53.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323952025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 77c868d3-41f6-4ae6-9ffb-b18f10301b6a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323962025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 77c868d3-41f6-4ae6-9ffb-b18f10301b6a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323972025-03-07T23:12:53.537ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 77c868d3-41f6-4ae6-9ffb-b18f10301b6a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323982025-03-07T23:12:53.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 232 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 77c868d3-41f6-4ae6-9ffb-b18f10301b6a response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
323992025-03-07T23:12:53.537ZINFOtest_unauthorized (external client test context): client received response status = 401
324002025-03-07T23:12:53.537ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324012025-03-07T23:12:53.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324022025-03-07T23:12:53.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 579ef096-024f-4561-ae5e-8246b2d9edae uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324032025-03-07T23:12:53.539ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 579ef096-024f-4561-ae5e-8246b2d9edae uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324042025-03-07T23:12:53.541ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3149:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3183:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 579ef096-024f-4561-ae5e-8246b2d9edae uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324052025-03-07T23:12:53.541ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2260 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 579ef096-024f-4561-ae5e-8246b2d9edae response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324062025-03-07T23:12:53.541ZINFOtest_unauthorized (external client test context): client received response status = 401
324072025-03-07T23:12:53.541ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324082025-03-07T23:12:53.541ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324092025-03-07T23:12:53.541ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324102025-03-07T23:12:53.542ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324112025-03-07T23:12:53.546ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324122025-03-07T23:12:53.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324132025-03-07T23:12:53.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324142025-03-07T23:12:53.547ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324152025-03-07T23:12:53.583ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
324162025-03-07T23:12:53.583ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324172025-03-07T23:12:53.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324182025-03-07T23:12:53.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324192025-03-07T23:12:53.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324202025-03-07T23:12:53.586ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 84b585f7-bed3-4162-95e3-5722cdc8b3ce uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324212025-03-07T23:12:53.586ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 84b585f7-bed3-4162-95e3-5722cdc8b3ce resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324222025-03-07T23:12:53.586ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 84b585f7-bed3-4162-95e3-5722cdc8b3ce roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324232025-03-07T23:12:53.587ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 84b585f7-bed3-4162-95e3-5722cdc8b3ce resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324242025-03-07T23:12:53.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324252025-03-07T23:12:53.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324262025-03-07T23:12:53.592ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
324272025-03-07T23:12:53.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
324282025-03-07T23:12:53.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324292025-03-07T23:12:53.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324302025-03-07T23:12:53.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324312025-03-07T23:12:53.594ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7639 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 84b585f7-bed3-4162-95e3-5722cdc8b3ce response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
324322025-03-07T23:12:53.594ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324332025-03-07T23:12:53.595ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324342025-03-07T23:12:53.595ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324352025-03-07T23:12:53.595ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324362025-03-07T23:12:53.597ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "84b585f7-bed3-4162-95e3-5722cdc8b3ce", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:52 GMT"} })
324372025-03-07T23:12:53.597ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324382025-03-07T23:12:53.599ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bb324843-82e8-4a96-9948-9187bcb40e97 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324392025-03-07T23:12:53.599ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bb324843-82e8-4a96-9948-9187bcb40e97 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324402025-03-07T23:12:53.601ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bb324843-82e8-4a96-9948-9187bcb40e97 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324412025-03-07T23:12:53.601ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bb324843-82e8-4a96-9948-9187bcb40e97 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324422025-03-07T23:12:53.602ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
324432025-03-07T23:12:53.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324442025-03-07T23:12:53.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324452025-03-07T23:12:53.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324462025-03-07T23:12:53.616ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 16835 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = bb324843-82e8-4a96-9948-9187bcb40e97 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
324472025-03-07T23:12:53.621ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "bb324843-82e8-4a96-9948-9187bcb40e97", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:52 GMT"} })
324482025-03-07T23:12:53.621ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324492025-03-07T23:12:53.621ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324502025-03-07T23:12:53.621ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
324512025-03-07T23:12:53.621ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
324522025-03-07T23:12:53.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
324532025-03-07T23:12:53.627ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324542025-03-07T23:12:53.627ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324552025-03-07T23:12:53.627ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324562025-03-07T23:12:53.648ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324572025-03-07T23:12:53.648ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324582025-03-07T23:12:53.648ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 11caa862-a1b6-48df-8206-c7317311b33f uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324592025-03-07T23:12:54.060ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 411168 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = 11caa862-a1b6-48df-8206-c7317311b33f response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324602025-03-07T23:12:54.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
324612025-03-07T23:12:54.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
324622025-03-07T23:12:54.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324632025-03-07T23:12:54.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324642025-03-07T23:12:54.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324652025-03-07T23:12:54.063ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324662025-03-07T23:12:54.488ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324672025-03-07T23:12:54.497ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324682025-03-07T23:12:54.497ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
324692025-03-07T23:12:54.499ZDEBGtest_unauthorized (results-sink): inserting 297 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324702025-03-07T23:12:54.505ZDEBGtest_unauthorized (results-sink-cluster): inserting 297 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324712025-03-07T23:12:54.506ZDEBGtest_unauthorized (clickhouse-client): unrolling 297 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
324722025-03-07T23:12:54.852ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
324732025-03-07T23:12:54.853ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
324742025-03-07T23:12:54.854ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
324752025-03-07T23:12:54.854ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
324762025-03-07T23:12:54.854ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324772025-03-07T23:12:54.871ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324782025-03-07T23:12:54.871ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
324792025-03-07T23:12:54.872ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324802025-03-07T23:12:54.873ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
324812025-03-07T23:12:54.873ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324822025-03-07T23:12:54.873ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324832025-03-07T23:12:54.874ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324842025-03-07T23:12:54.876ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
324852025-03-07T23:12:54.877ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
324862025-03-07T23:12:54.877ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
324872025-03-07T23:12:54.877ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
324882025-03-07T23:12:54.877ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
324892025-03-07T23:12:54.877ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
324902025-03-07T23:12:54.881ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = fields_ipaddr
324912025-03-07T23:12:54.881ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 594 sql = INSERT INTO oximeter.fields_string FORMAT Native
324922025-03-07T23:12:54.884ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324932025-03-07T23:12:54.884ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324942025-03-07T23:12:54.884ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324952025-03-07T23:12:54.884ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
324962025-03-07T23:12:54.884ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
324972025-03-07T23:12:54.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
324982025-03-07T23:12:54.887ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
324992025-03-07T23:12:54.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325002025-03-07T23:12:54.887ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325012025-03-07T23:12:54.888ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325022025-03-07T23:12:54.900ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325032025-03-07T23:12:54.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325042025-03-07T23:12:54.901ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325052025-03-07T23:12:54.903ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 594 table_name = fields_string
325062025-03-07T23:12:54.903ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 296 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
325072025-03-07T23:12:54.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325082025-03-07T23:12:54.908ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325092025-03-07T23:12:54.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325102025-03-07T23:12:54.909ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 296 table_name = fields_u16
325112025-03-07T23:12:54.909ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 302 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
325122025-03-07T23:12:54.913ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325132025-03-07T23:12:54.913ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325142025-03-07T23:12:54.913ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325152025-03-07T23:12:54.914ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325162025-03-07T23:12:54.915ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325172025-03-07T23:12:54.920ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325182025-03-07T23:12:54.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325192025-03-07T23:12:54.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325202025-03-07T23:12:54.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325212025-03-07T23:12:54.922ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 302 table_name = fields_uuid
325222025-03-07T23:12:54.922ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
325232025-03-07T23:12:54.931ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325242025-03-07T23:12:54.934ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325252025-03-07T23:12:54.934ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325262025-03-07T23:12:54.934ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325272025-03-07T23:12:54.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325282025-03-07T23:12:54.955ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325292025-03-07T23:12:54.955ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 1414511 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8785e0d0-012e-4ab3-8797-679d000cb4cb response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325302025-03-07T23:12:54.956ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_cumulativeu64
325312025-03-07T23:12:54.956ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 295 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
325322025-03-07T23:12:54.957ZINFOtest_unauthorized (external client test context): client received response status = 404
325332025-03-07T23:12:54.957ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325342025-03-07T23:12:54.957ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325352025-03-07T23:12:54.958ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cd5b6748-f210-430d-8f6d-f76dfbf42af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325362025-03-07T23:12:54.958ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cd5b6748-f210-430d-8f6d-f76dfbf42af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325372025-03-07T23:12:54.963ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cd5b6748-f210-430d-8f6d-f76dfbf42af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325382025-03-07T23:12:54.963ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cd5b6748-f210-430d-8f6d-f76dfbf42af5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325392025-03-07T23:12:54.963ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 5509 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cd5b6748-f210-430d-8f6d-f76dfbf42af5 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325402025-03-07T23:12:54.967ZINFOtest_unauthorized (external client test context): client received response status = 401
325412025-03-07T23:12:54.967ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325422025-03-07T23:12:54.967ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325432025-03-07T23:12:54.968ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3c69038-b43b-4a07-8503-7fd5c4fd419d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325442025-03-07T23:12:54.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3c69038-b43b-4a07-8503-7fd5c4fd419d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325452025-03-07T23:12:54.970ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3c69038-b43b-4a07-8503-7fd5c4fd419d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325462025-03-07T23:12:54.970ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 2337 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b3c69038-b43b-4a07-8503-7fd5c4fd419d response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325472025-03-07T23:12:54.971ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 295 table_name = measurements_histogramu64
325482025-03-07T23:12:54.972ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
325492025-03-07T23:12:54.972ZINFOtest_unauthorized (external client test context): client received response status = 401
325502025-03-07T23:12:54.972ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325512025-03-07T23:12:54.972ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325522025-03-07T23:12:54.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe7b844-7581-4f7c-8a6d-18dec3ffc33a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325532025-03-07T23:12:54.975ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe7b844-7581-4f7c-8a6d-18dec3ffc33a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325542025-03-07T23:12:54.977ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3194:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3228:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe7b844-7581-4f7c-8a6d-18dec3ffc33a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325552025-03-07T23:12:54.977ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1380 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = dfe7b844-7581-4f7c-8a6d-18dec3ffc33a response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325562025-03-07T23:12:54.978ZINFOtest_unauthorized (external client test context): client received response status = 401
325572025-03-07T23:12:54.979ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325582025-03-07T23:12:54.979ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325592025-03-07T23:12:54.979ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 904822e9-3114-4d98-943a-10f4aa3d9501 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325602025-03-07T23:12:54.979ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 904822e9-3114-4d98-943a-10f4aa3d9501 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325612025-03-07T23:12:54.980ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
325622025-03-07T23:12:54.982ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
325632025-03-07T23:12:54.983ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
325642025-03-07T23:12:54.984ZINFOtest_unauthorized (external client test context): client received response status = 405
325652025-03-07T23:12:54.984ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325662025-03-07T23:12:54.984ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325672025-03-07T23:12:54.985ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bfddcc9f-b44f-48a9-a32c-89a45bc74f64 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325682025-03-07T23:12:54.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 105 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bfddcc9f-b44f-48a9-a32c-89a45bc74f64 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325692025-03-07T23:12:54.987ZINFOtest_unauthorized (external client test context): client received response status = 405
325702025-03-07T23:12:54.988ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325712025-03-07T23:12:54.988ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325722025-03-07T23:12:54.988ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 527ad39f-e986-4e6f-adea-97779f91e09c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325732025-03-07T23:12:54.989ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 527ad39f-e986-4e6f-adea-97779f91e09c response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325742025-03-07T23:12:54.995ZINFOtest_unauthorized (external client test context): client received response status = 405
325752025-03-07T23:12:54.995ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325762025-03-07T23:12:54.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325772025-03-07T23:12:55.001ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a3cbcde-8d27-44e3-a5d2-266a0b9c708a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325782025-03-07T23:12:55.002ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 278 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a3cbcde-8d27-44e3-a5d2-266a0b9c708a response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325792025-03-07T23:12:55.003ZINFOtest_unauthorized (external client test context): client received response status = 405
325802025-03-07T23:12:55.003ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325812025-03-07T23:12:55.003ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325822025-03-07T23:12:55.003ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325832025-03-07T23:12:55.004ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325842025-03-07T23:12:55.004ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
325852025-03-07T23:12:55.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325862025-03-07T23:12:55.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325872025-03-07T23:12:55.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325882025-03-07T23:12:55.017ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325892025-03-07T23:12:55.018ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325902025-03-07T23:12:55.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325912025-03-07T23:12:55.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
325922025-03-07T23:12:55.023ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
325932025-03-07T23:12:55.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325942025-03-07T23:12:55.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325952025-03-07T23:12:55.026ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325962025-03-07T23:12:55.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
325972025-03-07T23:12:55.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325982025-03-07T23:12:55.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325992025-03-07T23:12:55.031ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326002025-03-07T23:12:55.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
326012025-03-07T23:12:55.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
326022025-03-07T23:12:55.045ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326032025-03-07T23:12:55.047ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326042025-03-07T23:12:55.047ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326052025-03-07T23:12:55.051ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
326062025-03-07T23:12:55.051ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
326072025-03-07T23:12:55.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326082025-03-07T23:12:55.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326092025-03-07T23:12:55.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326102025-03-07T23:12:55.054ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
326112025-03-07T23:12:55.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326122025-03-07T23:12:55.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326132025-03-07T23:12:55.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326142025-03-07T23:12:55.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
326152025-03-07T23:12:55.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
326162025-03-07T23:12:55.063ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326172025-03-07T23:12:55.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326182025-03-07T23:12:55.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326192025-03-07T23:12:55.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326202025-03-07T23:12:55.068ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326212025-03-07T23:12:55.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326222025-03-07T23:12:55.069ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326232025-03-07T23:12:55.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326242025-03-07T23:12:55.072ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326252025-03-07T23:12:55.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326262025-03-07T23:12:55.076ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326272025-03-07T23:12:55.081ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326282025-03-07T23:12:55.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326292025-03-07T23:12:55.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326302025-03-07T23:12:55.081ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326312025-03-07T23:12:55.082ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326322025-03-07T23:12:55.082ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326332025-03-07T23:12:55.082ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326342025-03-07T23:12:55.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326352025-03-07T23:12:55.096ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326362025-03-07T23:12:55.096ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326372025-03-07T23:12:55.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326382025-03-07T23:12:55.098ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326392025-03-07T23:12:55.108ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326402025-03-07T23:12:55.117ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326412025-03-07T23:12:55.118ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326422025-03-07T23:12:55.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326432025-03-07T23:12:55.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326442025-03-07T23:12:55.123ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326452025-03-07T23:12:55.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326462025-03-07T23:12:55.124ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326472025-03-07T23:12:55.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326482025-03-07T23:12:55.127ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326492025-03-07T23:12:55.129ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326502025-03-07T23:12:55.132ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326512025-03-07T23:12:55.132ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326522025-03-07T23:12:55.133ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326532025-03-07T23:12:55.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326542025-03-07T23:12:55.133ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326552025-03-07T23:12:55.137ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326562025-03-07T23:12:55.137ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326572025-03-07T23:12:55.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326582025-03-07T23:12:55.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326592025-03-07T23:12:55.142ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326602025-03-07T23:12:55.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326612025-03-07T23:12:55.142ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326622025-03-07T23:12:55.144ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326632025-03-07T23:12:55.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326642025-03-07T23:12:55.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: f0706660-c75b-4f1e-b508-3bd34bfe900f, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326652025-03-07T23:12:55.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326662025-03-07T23:12:55.158ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326672025-03-07T23:12:55.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326682025-03-07T23:12:55.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326692025-03-07T23:12:55.163ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326702025-03-07T23:12:55.165ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326712025-03-07T23:12:55.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326722025-03-07T23:12:55.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326732025-03-07T23:12:55.168ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326742025-03-07T23:12:55.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326752025-03-07T23:12:55.173ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326762025-03-07T23:12:55.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326772025-03-07T23:12:55.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326782025-03-07T23:12:55.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326792025-03-07T23:12:55.194ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 248a93f8-607e-4099-841c-2067d68e18ba, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326802025-03-07T23:12:55.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326812025-03-07T23:12:55.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326822025-03-07T23:12:55.195ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326832025-03-07T23:12:55.199ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 195437 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 13abfd47-0fdb-4e05-8246-59f214377cfb response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
326842025-03-07T23:12:55.200ZINFOtest_unauthorized (external client test context): client received response status = 200
326852025-03-07T23:12:55.200ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326862025-03-07T23:12:55.200ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326872025-03-07T23:12:55.200ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326882025-03-07T23:12:55.200ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326892025-03-07T23:12:55.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cb829eb0-7003-4e92-86f2-6988e37c7d96 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326902025-03-07T23:12:55.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = cb829eb0-7003-4e92-86f2-6988e37c7d96 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326912025-03-07T23:12:55.201ZINFOtest_unauthorized (external client test context): client received response status = 405
326922025-03-07T23:12:55.201ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326932025-03-07T23:12:55.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326942025-03-07T23:12:55.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a673f0f8-4f7d-42e1-820e-ef892c67f9ad uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326952025-03-07T23:12:55.202ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 100 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a673f0f8-4f7d-42e1-820e-ef892c67f9ad response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326962025-03-07T23:12:55.202ZINFOtest_unauthorized (external client test context): client received response status = 405
326972025-03-07T23:12:55.203ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326982025-03-07T23:12:55.203ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
326992025-03-07T23:12:55.203ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a9bf8323-7671-43d9-a328-bc69dc8f2c80 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327002025-03-07T23:12:55.203ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a9bf8323-7671-43d9-a328-bc69dc8f2c80 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327012025-03-07T23:12:55.203ZINFOtest_unauthorized (external client test context): client received response status = 405
327022025-03-07T23:12:55.203ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327032025-03-07T23:12:55.203ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327042025-03-07T23:12:55.203ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b588357-31f4-4999-a9d2-fd5b9e36f9bf uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327052025-03-07T23:12:55.203ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b588357-31f4-4999-a9d2-fd5b9e36f9bf response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327062025-03-07T23:12:55.204ZINFOtest_unauthorized (external client test context): client received response status = 405
327072025-03-07T23:12:55.204ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327082025-03-07T23:12:55.204ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327092025-03-07T23:12:55.204ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 00e806ce-7591-4d91-ab42-669971c5b5f9 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327102025-03-07T23:12:55.204ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 00e806ce-7591-4d91-ab42-669971c5b5f9 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327112025-03-07T23:12:55.204ZINFOtest_unauthorized (external client test context): client received response status = 405
327122025-03-07T23:12:55.205ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327132025-03-07T23:12:55.205ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327142025-03-07T23:12:55.205ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 56692a49-0447-47f3-9d01-6d3b5ad056b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327152025-03-07T23:12:55.206ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 174 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 56692a49-0447-47f3-9d01-6d3b5ad056b1 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327162025-03-07T23:12:55.206ZINFOtest_unauthorized (external client test context): client received response status = 405
327172025-03-07T23:12:55.206ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327182025-03-07T23:12:55.206ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327192025-03-07T23:12:55.206ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d50da8-9682-4301-9f95-76756bdccc63 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327202025-03-07T23:12:55.207ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1304 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 42d50da8-9682-4301-9f95-76756bdccc63 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327212025-03-07T23:12:55.208ZINFOtest_unauthorized (external client test context): client received response status = 405
327222025-03-07T23:12:55.208ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327232025-03-07T23:12:55.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327242025-03-07T23:12:55.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4b76e031-ac46-4901-83a3-3ed2dea4dab6 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327252025-03-07T23:12:55.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4b76e031-ac46-4901-83a3-3ed2dea4dab6 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327262025-03-07T23:12:55.209ZINFOtest_unauthorized (external client test context): client received response status = 405
327272025-03-07T23:12:55.209ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327282025-03-07T23:12:55.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327292025-03-07T23:12:55.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327302025-03-07T23:12:55.210ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327312025-03-07T23:12:55.210ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327322025-03-07T23:12:55.210ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327332025-03-07T23:12:55.210ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327342025-03-07T23:12:55.211ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327352025-03-07T23:12:55.214ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327362025-03-07T23:12:55.214ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327372025-03-07T23:12:55.215ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327382025-03-07T23:12:55.217ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
327392025-03-07T23:12:55.217ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
327402025-03-07T23:12:55.219ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327412025-03-07T23:12:55.221ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327422025-03-07T23:12:55.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327432025-03-07T23:12:55.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
327442025-03-07T23:12:55.222ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
327452025-03-07T23:12:55.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
327462025-03-07T23:12:55.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
327472025-03-07T23:12:55.223ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
327482025-03-07T23:12:55.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327492025-03-07T23:12:55.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327502025-03-07T23:12:55.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327512025-03-07T23:12:55.228ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
327522025-03-07T23:12:55.228ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
327532025-03-07T23:12:55.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
327542025-03-07T23:12:55.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
327552025-03-07T23:12:55.238ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327562025-03-07T23:12:55.238ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327572025-03-07T23:12:55.239ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327582025-03-07T23:12:55.241ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
327592025-03-07T23:12:55.241ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
327602025-03-07T23:12:55.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
327612025-03-07T23:12:55.244ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
327622025-03-07T23:12:55.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327632025-03-07T23:12:55.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327642025-03-07T23:12:55.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327652025-03-07T23:12:55.249ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
327662025-03-07T23:12:55.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327672025-03-07T23:12:55.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327682025-03-07T23:12:55.249ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327692025-03-07T23:12:55.251ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
327702025-03-07T23:12:55.256ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
327712025-03-07T23:12:55.257ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327722025-03-07T23:12:55.257ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327732025-03-07T23:12:55.257ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327742025-03-07T23:12:55.258ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327752025-03-07T23:12:55.262ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327762025-03-07T23:12:55.262ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327772025-03-07T23:12:55.263ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327782025-03-07T23:12:55.265ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327792025-03-07T23:12:55.265ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327802025-03-07T23:12:55.266ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327812025-03-07T23:12:55.268ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327822025-03-07T23:12:55.273ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327832025-03-07T23:12:55.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327842025-03-07T23:12:55.273ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327852025-03-07T23:12:55.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327862025-03-07T23:12:55.278ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327872025-03-07T23:12:55.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327882025-03-07T23:12:55.281ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327892025-03-07T23:12:55.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327902025-03-07T23:12:55.289ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327912025-03-07T23:12:55.289ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327922025-03-07T23:12:55.289ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327932025-03-07T23:12:55.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327942025-03-07T23:12:55.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327952025-03-07T23:12:55.342ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327962025-03-07T23:12:55.343ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 133433 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 6a5a97db-78db-4c7e-adf4-46d4070e20b1 response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
327972025-03-07T23:12:55.344ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 3 reason = Timeout
327982025-03-07T23:12:55.345ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
327992025-03-07T23:12:55.345ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
328002025-03-07T23:12:55.345ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
328012025-03-07T23:12:55.346ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
328022025-03-07T23:12:55.346ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 4 reason = Timeout
328032025-03-07T23:12:55.392ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:35595] } uri = http://[::1]:35595/config
328042025-03-07T23:12:55.392ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 3 reason = Timeout
328052025-03-07T23:12:55.394ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
328062025-03-07T23:12:55.394ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 4 reason = Timeout
328072025-03-07T23:12:55.394ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
328082025-03-07T23:12:55.394ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
328092025-03-07T23:12:55.394ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
328102025-03-07T23:12:55.394ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
328112025-03-07T23:12:55.394ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 5 reason = Timeout
328122025-03-07T23:12:55.432ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:45425 generation = 3 method = PUT servers = DnsServersList { addresses: [[::1]:45425] } uri = http://[::1]:45425/config
328132025-03-07T23:12:55.432ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 3 reason = Timeout
328142025-03-07T23:12:55.433ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
328152025-03-07T23:12:55.434ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 2 reason = Timeout
328162025-03-07T23:12:55.434ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2025-03-07 23:02:55.433459457 UTC
328172025-03-07T23:12:55.434ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
328182025-03-07T23:12:55.434ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
328192025-03-07T23:12:55.434ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
328202025-03-07T23:12:55.435ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 5 reason = Timeout
328212025-03-07T23:12:55.435ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
328222025-03-07T23:12:55.435ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328232025-03-07T23:12:55.435ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
328242025-03-07T23:12:55.435ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
328252025-03-07T23:12:55.435ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
328262025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 3 reason = Timeout
328272025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 2 reason = Timeout
328282025-03-07T23:12:55.436ZINFOtest_unauthorized (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
328292025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 37.532\u{b5}s iteration = 2 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
328302025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 10 reason = Timeout
328312025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 10.59\u{b5}s iteration = 10 status = {"error":"task disabled"}
328322025-03-07T23:12:55.436ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 3 reason = Timeout
328332025-03-07T23:12:55.436ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
328342025-03-07T23:12:55.437ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328352025-03-07T23:12:55.437ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
328362025-03-07T23:12:55.437ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
328372025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
328382025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement iteration = 2 reason = Timeout
328392025-03-07T23:12:55.438ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
328402025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
328412025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
328422025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement_driver iteration = 2 reason = Timeout
328432025-03-07T23:12:55.438ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
328442025-03-07T23:12:55.438ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
328452025-03-07T23:12:55.439ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
328462025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 3 reason = Timeout
328472025-03-07T23:12:55.441ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
328482025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 90.473\u{b5}s iteration = 3 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
328492025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 2 reason = Timeout
328502025-03-07T23:12:55.441ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
328512025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
328522025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
328532025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 7 reason = Timeout
328542025-03-07T23:12:55.441ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
328552025-03-07T23:12:55.441ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
328562025-03-07T23:12:55.441ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328572025-03-07T23:12:55.441ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
328582025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
328592025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
328602025-03-07T23:12:55.441ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = lookup_region_port iteration = 2 reason = Timeout
328612025-03-07T23:12:55.441ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
328622025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
328632025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
328642025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 2 reason = Timeout
328652025-03-07T23:12:55.443ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
328662025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
328672025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
328682025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 4 reason = Timeout
328692025-03-07T23:12:55.443ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
328702025-03-07T23:12:55.443ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
328712025-03-07T23:12:55.444ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
328722025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 2 reason = Timeout
328732025-03-07T23:12:55.445ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
328742025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
328752025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
328762025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 3 reason = Timeout
328772025-03-07T23:12:55.445ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
328782025-03-07T23:12:55.445ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328792025-03-07T23:12:55.445ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
328802025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
328812025-03-07T23:12:55.445ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
328822025-03-07T23:12:55.448ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 2 reason = Timeout
328832025-03-07T23:12:55.457ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
328842025-03-07T23:12:55.457ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
328852025-03-07T23:12:55.457ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
328862025-03-07T23:12:55.458ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 2 reason = Timeout
328872025-03-07T23:12:55.459ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database
328882025-03-07T23:12:55.459ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
328892025-03-07T23:12:55.459ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
328902025-03-07T23:12:55.459ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 2 reason = Timeout
328912025-03-07T23:12:55.459ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database
328922025-03-07T23:12:55.459ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
328932025-03-07T23:12:55.459ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
328942025-03-07T23:12:55.459ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
328952025-03-07T23:12:55.459ZINFOtest_unauthorized (external client test context): client received response status = 404
328962025-03-07T23:12:55.461ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
328972025-03-07T23:12:55.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
328982025-03-07T23:12:55.461ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:35595 remote_addr = [::1]:52032
328992025-03-07T23:12:55.461ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:45425 remote_addr = [::1]:33430
329002025-03-07T23:12:55.461ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
329012025-03-07T23:12:55.461ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
329022025-03-07T23:12:55.461ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
329032025-03-07T23:12:55.461ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
329042025-03-07T23:12:55.461ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
329052025-03-07T23:12:55.461ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:35595 method = PUT remote_addr = [::1]:52032 req_id = 55935353-aca4-464b-ba12-e8f6582dfde9 uri = /config
329062025-03-07T23:12:55.461ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33430 req_id = edc0cc06-9a46-4305-83d8-20e910ae241e uri = /config
329072025-03-07T23:12:55.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7b475f12-40e8-4267-afc3-061a378299d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329082025-03-07T23:12:55.461ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 55935353-aca4-464b-ba12-e8f6582dfde9
329092025-03-07T23:12:55.461ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 55935353-aca4-464b-ba12-e8f6582dfde9
329102025-03-07T23:12:55.461ZINFOtest_unauthorized (store): attempting generation update new_generation = 3 req_id = edc0cc06-9a46-4305-83d8-20e910ae241e
329112025-03-07T23:12:55.461ZINFOtest_unauthorized (store): updated generation new_generation = 3 req_id = edc0cc06-9a46-4305-83d8-20e910ae241e
329122025-03-07T23:12:55.462ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 02 64 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .d..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:49931 req_id = e3fa6133-9687-4099-a7d4-9bd3446cc62f
329132025-03-07T23:12:55.462ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 612,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49931 req_id = e3fa6133-9687-4099-a7d4-9bd3446cc62f
329142025-03-07T23:12:55.462ZDEBGtest_unauthorized (store): query key key = _nameservice._tcp
329152025-03-07T23:12:55.462ZDEBGtest_unauthorized (store): query key key = 28a47900-2f91-401f-929b-b6803f4d8da7.host
329162025-03-07T23:12:55.462ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:49931 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35595, target: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal") })) }] req_id = e3fa6133-9687-4099-a7d4-9bd3446cc62f
329172025-03-07T23:12:55.462ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: ee ea 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:59184 req_id = fddf9084-7880-488b-93b1-07e92ff6d26e
329182025-03-07T23:12:55.462ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61162,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59184 req_id = fddf9084-7880-488b-93b1-07e92ff6d26e
329192025-03-07T23:12:55.462ZDEBGtest_unauthorized (store): query key key = _external-dns._tcp
329202025-03-07T23:12:55.462ZDEBGtest_unauthorized (store): query key key = 1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host
329212025-03-07T23:12:55.462ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:59184 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45425, target: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal") })) }] req_id = fddf9084-7880-488b-93b1-07e92ff6d26e
329222025-03-07T23:12:55.462ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7b475f12-40e8-4267-afc3-061a378299d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329232025-03-07T23:12:55.462ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7b475f12-40e8-4267-afc3-061a378299d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329242025-03-07T23:12:55.462ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7b475f12-40e8-4267-afc3-061a378299d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329252025-03-07T23:12:55.462ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 7145 local_addr = [::1]:35595 method = PUT remote_addr = [::1]:52032 req_id = 55935353-aca4-464b-ba12-e8f6582dfde9 response_code = 204 uri = /config
329262025-03-07T23:12:55.462ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 7118 local_addr = [::1]:45425 method = PUT remote_addr = [::1]:33430 req_id = edc0cc06-9a46-4305-83d8-20e910ae241e response_code = 204 uri = /config
329272025-03-07T23:12:55.462ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 7125 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 7b475f12-40e8-4267-afc3-061a378299d3 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329282025-03-07T23:12:55.462ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
329292025-03-07T23:12:55.462ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
329302025-03-07T23:12:55.462ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
329312025-03-07T23:12:55.463ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
329322025-03-07T23:12:55.463ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
329332025-03-07T23:12:55.464ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35595, target: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2860, tv_nsec: 241393796 } })
329342025-03-07T23:12:55.465ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
329352025-03-07T23:12:55.465ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45425, target: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 2860, tv_nsec: 241887259 } })
329362025-03-07T23:12:55.465ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
329372025-03-07T23:12:55.465ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 result = Ok(Response { url: "http://[::1]:35595/config", status: 204, headers: {"x-request-id": "55935353-aca4-464b-ba12-e8f6582dfde9", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} }) servers = DnsServersList { addresses: [[::1]:35595] }
329382025-03-07T23:12:55.465ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:35595 generation = 1 servers = DnsServersList { addresses: [[::1]:35595] }
329392025-03-07T23:12:55.467ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:35595] }
329402025-03-07T23:12:55.468ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 121.767342ms iteration = 4 status = {"generation":1,"server_results":{"[::1]:35595":{"Ok":null}}}
329412025-03-07T23:12:55.469ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 3 result = Ok(Response { url: "http://[::1]:45425/config", status: 204, headers: {"x-request-id": "edc0cc06-9a46-4305-83d8-20e910ae241e", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} }) servers = DnsServersList { addresses: [[::1]:45425] }
329422025-03-07T23:12:55.469ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 3 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45425 generation = 3 servers = DnsServersList { addresses: [[::1]:45425] }
329432025-03-07T23:12:55.470ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 3 servers = DnsServersList { addresses: [[::1]:45425] }
329442025-03-07T23:12:55.471ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 76.074329ms iteration = 5 status = {"generation":3,"server_results":{"[::1]:45425":{"Ok":null}}}
329452025-03-07T23:12:55.476ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
329462025-03-07T23:12:55.481ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
329472025-03-07T23:12:55.482ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
329482025-03-07T23:12:55.482ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
329492025-03-07T23:12:55.483ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
329502025-03-07T23:12:55.483ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2025-03-07 23:02:55.433459457 UTC pruned = {}
329512025-03-07T23:12:55.483ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 50.447558ms iteration = 2 status = {"expiration":"2025-03-07T23:02:55.433459457Z","pruned":[]}
329522025-03-07T23:12:55.484ZINFOtest_unauthorized (external client test context): client received response status = 401
329532025-03-07T23:12:55.485ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329542025-03-07T23:12:55.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329552025-03-07T23:12:55.486ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cef9baee-a457-49eb-a8cb-651d2a2b28d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329562025-03-07T23:12:55.487ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 29 0a 01 00 00 01 00 00 00 00 00 01 24 32 38 61 )...........$28a\n0010: 34 37 39 30 30 2d 32 66 39 31 2d 34 30 31 66 2d 47900-2f91-401f-\n0020: 39 32 39 62 2d 62 36 38 30 33 66 34 64 38 64 61 929b-b6803f4d8da\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:53048 req_id = a3231ab8-344d-4b7e-806b-e5dac876393c
329572025-03-07T23:12:55.487ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 10506,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 50,\n 56,\n 97,\n 52,\n 55,\n 57,\n 48,\n 48,\n 45,\n 50,\n 102,\n 57,\n 49,\n 45,\n 52,\n 48,\n 49,\n 102,\n 45,\n 57,\n 50,\n 57,\n 98,\n 45,\n 98,\n 54,\n 56,\n 48,\n 51,\n 102,\n 52,\n 100,\n 56,\n 100,\n 97,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53048 req_id = a3231ab8-344d-4b7e-806b-e5dac876393c
329582025-03-07T23:12:55.487ZDEBGtest_unauthorized (store): query key key = 28a47900-2f91-401f-929b-b6803f4d8da7.host
329592025-03-07T23:12:55.487ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:53048 query = LowerQuery { name: LowerName(Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal.")), original: Query { name: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("28a47900-2f91-401f-929b-b6803f4d8da7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = a3231ab8-344d-4b7e-806b-e5dac876393c
329602025-03-07T23:12:55.487ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: f8 72 01 00 00 01 00 00 00 00 00 01 24 31 63 34 .r..........$1c4\n0010: 65 66 62 33 37 2d 36 35 66 30 2d 34 62 38 33 2d efb37-65f0-4b83-\n0020: 62 35 38 33 2d 37 65 38 37 36 65 33 63 61 33 65 b583-7e876e3ca3e\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:58013 req_id = 0c564540-00f4-4869-a402-2fc497cbbe54
329612025-03-07T23:12:55.488ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 63602,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 49,\n 99,\n 52,\n 101,\n 102,\n 98,\n 51,\n 55,\n 45,\n 54,\n 53,\n 102,\n 48,\n 45,\n 52,\n 98,\n 56,\n 51,\n 45,\n 98,\n 53,\n 56,\n 51,\n 45,\n 55,\n 101,\n 56,\n 55,\n 54,\n 101,\n 51,\n 99,\n 97,\n 51,\n 101,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58013 req_id = 0c564540-00f4-4869-a402-2fc497cbbe54
329622025-03-07T23:12:55.488ZDEBGtest_unauthorized (store): query key key = 1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host
329632025-03-07T23:12:55.488ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:58013 query = LowerQuery { name: LowerName(Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal.")), original: Query { name: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("1c4efb37-65f0-4b83-b583-7e876e3ca3e9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 0c564540-00f4-4869-a402-2fc497cbbe54
329642025-03-07T23:12:55.488ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cef9baee-a457-49eb-a8cb-651d2a2b28d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329652025-03-07T23:12:55.488ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cef9baee-a457-49eb-a8cb-651d2a2b28d3 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329662025-03-07T23:12:55.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1335 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = cef9baee-a457-49eb-a8cb-651d2a2b28d3 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329672025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): found DNS servers (no change) addresses = DnsServersList { addresses: [[::1]:35595] } background_task = dns_servers_internal current_servers = DnsServersList { addresses: [[::1]:35595] } dns_group = internal
329682025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 95.969649ms iteration = 3 status = {"addresses":["[::1]:35595"]}
329692025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): found DNS servers (no change) addresses = DnsServersList { addresses: [[::1]:45425] } background_task = dns_servers_external current_servers = DnsServersList { addresses: [[::1]:45425] } dns_group = external
329702025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 56.136377ms iteration = 3 status = {"addresses":["[::1]:45425"]}
329712025-03-07T23:12:55.497ZINFOtest_unauthorized (external client test context): client received response status = 401
329722025-03-07T23:12:55.497ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329732025-03-07T23:12:55.497ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329742025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
329752025-03-07T23:12:55.497ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
329762025-03-07T23:12:55.497ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
329772025-03-07T23:12:55.498ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
329782025-03-07T23:12:55.498ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
329792025-03-07T23:12:55.498ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 62.092573ms iteration = 3 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
329802025-03-07T23:12:55.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 267892ba-8052-486d-a154-c3ab4b3df6b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329812025-03-07T23:12:55.499ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 267892ba-8052-486d-a154-c3ab4b3df6b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329822025-03-07T23:12:55.499ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1916:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1935:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 267892ba-8052-486d-a154-c3ab4b3df6b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329832025-03-07T23:12:55.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1089 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 267892ba-8052-486d-a154-c3ab4b3df6b1 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329842025-03-07T23:12:55.500ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
329852025-03-07T23:12:55.500ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
329862025-03-07T23:12:55.501ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
329872025-03-07T23:12:55.501ZINFOtest_unauthorized (external client test context): client received response status = 401
329882025-03-07T23:12:55.501ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329892025-03-07T23:12:55.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329902025-03-07T23:12:55.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ddef985d-82df-44bb-9693-c7b51e0dcae8 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329912025-03-07T23:12:55.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ddef985d-82df-44bb-9693-c7b51e0dcae8 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329922025-03-07T23:12:55.503ZINFOtest_unauthorized (external client test context): client received response status = 405
329932025-03-07T23:12:55.503ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329942025-03-07T23:12:55.503ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329952025-03-07T23:12:55.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cffecc43-94bb-46f8-8851-c54dcd42a455 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329962025-03-07T23:12:55.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = cffecc43-94bb-46f8-8851-c54dcd42a455 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329972025-03-07T23:12:55.503ZINFOtest_unauthorized (external client test context): client received response status = 405
329982025-03-07T23:12:55.503ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
329992025-03-07T23:12:55.503ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330002025-03-07T23:12:55.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7998b87c-55b9-4f8c-86fa-9a02f75d31b1 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330012025-03-07T23:12:55.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 7998b87c-55b9-4f8c-86fa-9a02f75d31b1 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330022025-03-07T23:12:55.516ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 75.157794ms iteration = 2 status = {"errors":[],"found_port_ok":[]}
330032025-03-07T23:12:55.531ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
330042025-03-07T23:12:55.537ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
330052025-03-07T23:12:55.538ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
330062025-03-07T23:12:55.538ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
330072025-03-07T23:12:55.538ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
330082025-03-07T23:12:55.538ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
330092025-03-07T23:12:55.542ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
330102025-03-07T23:12:55.548ZINFOtest_unauthorized (external client test context): client received response status = 405
330112025-03-07T23:12:55.548ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330122025-03-07T23:12:55.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330132025-03-07T23:12:55.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a08a8d25-ba9e-4cbc-80dc-9083ec19f422 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330142025-03-07T23:12:55.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a08a8d25-ba9e-4cbc-80dc-9083ec19f422 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330152025-03-07T23:12:55.548ZINFOtest_unauthorized (external client test context): client received response status = 405
330162025-03-07T23:12:55.549ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330172025-03-07T23:12:55.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330182025-03-07T23:12:55.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bb1f001d-931a-4e66-b74a-91624b242b15 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330192025-03-07T23:12:55.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = bb1f001d-931a-4e66-b74a-91624b242b15 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330202025-03-07T23:12:55.549ZINFOtest_unauthorized (external client test context): client received response status = 405
330212025-03-07T23:12:55.550ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330222025-03-07T23:12:55.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330232025-03-07T23:12:55.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b68a4c9b-de24-4338-b9cd-0dda02186661 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330242025-03-07T23:12:55.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b68a4c9b-de24-4338-b9cd-0dda02186661 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330252025-03-07T23:12:55.550ZINFOtest_unauthorized (external client test context): client received response status = 405
330262025-03-07T23:12:55.550ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330272025-03-07T23:12:55.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330282025-03-07T23:12:55.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c9c27462-c32b-49bf-9fcc-a9301fc3bbfb uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330292025-03-07T23:12:55.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c9c27462-c32b-49bf-9fcc-a9301fc3bbfb response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330302025-03-07T23:12:55.550ZINFOtest_unauthorized (external client test context): client received response status = 405
330312025-03-07T23:12:55.552ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330322025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330332025-03-07T23:12:55.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6dce04f-72b1-4a79-9b28-e76c5a6aa3e7 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330342025-03-07T23:12:55.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b6dce04f-72b1-4a79-9b28-e76c5a6aa3e7 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330352025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client received response status = 405
330362025-03-07T23:12:55.552ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
330372025-03-07T23:12:55.552ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330382025-03-07T23:12:55.552ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330392025-03-07T23:12:55.552ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330402025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330412025-03-07T23:12:55.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1cb137cd-cbcf-4b01-bb88-4b8632340756 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330422025-03-07T23:12:55.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1cb137cd-cbcf-4b01-bb88-4b8632340756 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330432025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client received response status = 405
330442025-03-07T23:12:55.552ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330452025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330462025-03-07T23:12:55.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c477af3b-53db-4edf-b682-c09395471b32 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330472025-03-07T23:12:55.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c477af3b-53db-4edf-b682-c09395471b32 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330482025-03-07T23:12:55.552ZINFOtest_unauthorized (external client test context): client received response status = 405
330492025-03-07T23:12:55.552ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330502025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330512025-03-07T23:12:55.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd344ccf-d1a3-4fcc-9cad-028e9d4b81d3 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330522025-03-07T23:12:55.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd344ccf-d1a3-4fcc-9cad-028e9d4b81d3 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330532025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client received response status = 405
330542025-03-07T23:12:55.554ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330552025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330562025-03-07T23:12:55.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63bb2ffe-605c-4973-81b8-07966928f475 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330572025-03-07T23:12:55.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63bb2ffe-605c-4973-81b8-07966928f475 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330582025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client received response status = 405
330592025-03-07T23:12:55.554ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330602025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330612025-03-07T23:12:55.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a658442b-2e11-4942-bd4c-0a3b93424982 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330622025-03-07T23:12:55.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a658442b-2e11-4942-bd4c-0a3b93424982 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330632025-03-07T23:12:55.554ZINFOtest_unauthorized (external client test context): client received response status = 405
330642025-03-07T23:12:55.554ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330652025-03-07T23:12:55.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330662025-03-07T23:12:55.556ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 13505bdb-a267-4048-9645-6e5cba331652 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330672025-03-07T23:12:55.556ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 13505bdb-a267-4048-9645-6e5cba331652 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330682025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client received response status = 405
330692025-03-07T23:12:55.557ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330702025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330712025-03-07T23:12:55.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 001df94d-2a29-4eea-a74c-c65068048bef uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330722025-03-07T23:12:55.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 001df94d-2a29-4eea-a74c-c65068048bef response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330732025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client received response status = 405
330742025-03-07T23:12:55.557ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330752025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330762025-03-07T23:12:55.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fa9e9c52-48fd-412e-9545-603df11eadc7 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330772025-03-07T23:12:55.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = fa9e9c52-48fd-412e-9545-603df11eadc7 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330782025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client received response status = 405
330792025-03-07T23:12:55.557ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330802025-03-07T23:12:55.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
330812025-03-07T23:12:55.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330822025-03-07T23:12:55.560ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330832025-03-07T23:12:55.562ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
330842025-03-07T23:12:55.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330852025-03-07T23:12:55.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330862025-03-07T23:12:55.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330872025-03-07T23:12:55.575ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
330882025-03-07T23:12:55.583ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
330892025-03-07T23:12:55.583ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
330902025-03-07T23:12:55.583ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
330912025-03-07T23:12:55.583ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
330922025-03-07T23:12:55.583ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
330932025-03-07T23:12:55.595ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330942025-03-07T23:12:55.595ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330952025-03-07T23:12:55.597ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330962025-03-07T23:12:55.598ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330972025-03-07T23:12:55.598ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330982025-03-07T23:12:55.598ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
330992025-03-07T23:12:55.604ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331002025-03-07T23:12:55.663ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
331012025-03-07T23:12:55.665ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
331022025-03-07T23:12:55.665ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
331032025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
331042025-03-07T23:12:55.668ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
331052025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
331062025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
331072025-03-07T23:12:55.668ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
331082025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
331092025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
331102025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
331112025-03-07T23:12:55.668ZINFOtest_unauthorized (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
331122025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 228.43368ms iteration = 2 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
331132025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 223.763989ms iteration = 2 status = {"errors":[],"garbage_collect_requested":[]}
331142025-03-07T23:12:55.668ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 221.644784ms iteration = 2 status = {"errors":[],"finish_invoked_ok":[]}
331152025-03-07T23:12:55.677ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331162025-03-07T23:12:55.695ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
331172025-03-07T23:12:55.700ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
331182025-03-07T23:12:55.700ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
331192025-03-07T23:12:55.703ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
331202025-03-07T23:12:55.705ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331212025-03-07T23:12:55.714ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
331222025-03-07T23:12:55.716ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
331232025-03-07T23:12:55.723ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
331242025-03-07T23:12:55.723ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
331252025-03-07T23:12:55.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
331262025-03-07T23:12:55.723ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
331272025-03-07T23:12:55.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
331282025-03-07T23:12:55.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
331292025-03-07T23:12:55.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
331302025-03-07T23:12:55.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
331312025-03-07T23:12:55.724ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
331322025-03-07T23:12:55.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
331332025-03-07T23:12:55.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
331342025-03-07T23:12:55.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
331352025-03-07T23:12:55.725ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
331362025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
331372025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
331382025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 3
331392025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
331402025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
331412025-03-07T23:12:55.731ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
331422025-03-07T23:12:55.731ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
331432025-03-07T23:12:55.731ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
331442025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
331452025-03-07T23:12:55.731ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
331462025-03-07T23:12:55.747ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331472025-03-07T23:12:55.753ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
331482025-03-07T23:12:55.753ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
331492025-03-07T23:12:55.753ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
331502025-03-07T23:12:55.754ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
331512025-03-07T23:12:55.756ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331522025-03-07T23:12:55.756ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331532025-03-07T23:12:55.757ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331542025-03-07T23:12:55.759ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 182643 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
331552025-03-07T23:12:55.760ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "be42e37b-4c3c-4f60-ae9d-5fb075c9fdd5", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} })
331562025-03-07T23:12:55.761ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
331572025-03-07T23:12:55.764ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 27f85091-fe6b-4f84-a0a2-433afddcbb7c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
331582025-03-07T23:12:55.764ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 27f85091-fe6b-4f84-a0a2-433afddcbb7c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
331592025-03-07T23:12:55.764ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 27f85091-fe6b-4f84-a0a2-433afddcbb7c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
331602025-03-07T23:12:55.767ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 27f85091-fe6b-4f84-a0a2-433afddcbb7c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
331612025-03-07T23:12:55.850ZTRACtest_unauthorized (BackgroundTasks): checking on VMM background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
331622025-03-07T23:12:55.851ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher body = None method = GET uri = http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
331632025-03-07T23:12:55.851ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
331642025-03-07T23:12:55.852ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
331652025-03-07T23:12:55.852ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
331662025-03-07T23:12:55.853ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 414.603967ms iteration = 2 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
331672025-03-07T23:12:55.853ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 405.681514ms iteration = 2 status = {"errors":[],"requests_created_ok":[]}
331682025-03-07T23:12:55.854ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
331692025-03-07T23:12:55.854ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
331702025-03-07T23:12:55.854ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
331712025-03-07T23:12:55.866ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34828 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
331722025-03-07T23:12:55.867ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34828 req_id = 465e3dfb-8ef8-4387-9b36-98f70031b96c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
331732025-03-07T23:12:55.868ZINFOtest_unauthorized (dropshot): request completed latency_us = 892 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34828 req_id = 465e3dfb-8ef8-4387-9b36-98f70031b96c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state
331742025-03-07T23:12:55.873ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher result = Ok(Response { url: "http://[::1]:41065/vmms/9881e95e-e389-429d-a9c9-e8e7527a4e19/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "465e3dfb-8ef8-4387-9b36-98f70031b96c", "content-length": "131", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} })
331752025-03-07T23:12:55.875ZDEBGtest_unauthorized (BackgroundTasks): updating instance state background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }, migration_in: None, migration_out: None } vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
331762025-03-07T23:12:55.875ZINFOtest_unauthorized (BackgroundTasks): received new VMM runtime state from sled agent background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19 vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:12:18.572620919Z }
331772025-03-07T23:12:55.875ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e resource = Database sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
331782025-03-07T23:12:55.875ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e roles = RoleSet { roles: {} } sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
331792025-03-07T23:12:55.875ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 3b345e54-8ce1-4328-8e77-7cf9ee33a84e resource = Database result = Ok(()) sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = 9881e95e-e389-429d-a9c9-e8e7527a4e19
331802025-03-07T23:12:55.875ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331812025-03-07T23:12:55.885ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
331822025-03-07T23:12:55.885ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
331832025-03-07T23:12:55.885ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
331842025-03-07T23:12:55.886ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
331852025-03-07T23:12:55.887ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331862025-03-07T23:12:55.899ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
331872025-03-07T23:12:55.899ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
331882025-03-07T23:12:55.899ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
331892025-03-07T23:12:55.900ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
331902025-03-07T23:12:55.919ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
331912025-03-07T23:12:55.932ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
331922025-03-07T23:12:55.932ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
331932025-03-07T23:12:55.932ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
331942025-03-07T23:12:55.933ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
331952025-03-07T23:12:55.936ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement elapsed = 496.592371ms iteration = 2 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
331962025-03-07T23:12:55.978ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
331972025-03-07T23:12:55.978ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:41065/vpc-routes
331982025-03-07T23:12:55.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
331992025-03-07T23:12:55.980ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
332002025-03-07T23:12:55.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332012025-03-07T23:12:55.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332022025-03-07T23:12:55.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332032025-03-07T23:12:55.983ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 541.130275ms iteration = 2 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
332042025-03-07T23:12:55.991ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 226916 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 27f85091-fe6b-4f84-a0a2-433afddcbb7c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
332052025-03-07T23:12:55.991ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34830 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
332062025-03-07T23:12:55.994ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "27f85091-fe6b-4f84-a0a2-433afddcbb7c", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} })
332072025-03-07T23:12:56.007ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
332082025-03-07T23:12:56.007ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
332092025-03-07T23:12:56.007ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
332102025-03-07T23:12:56.007ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34830 req_id = 56d9f4e0-f4f3-4683-99eb-48637eefa05b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
332112025-03-07T23:12:56.007ZINFOtest_unauthorized (dropshot): request completed latency_us = 1907 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34830 req_id = 56d9f4e0-f4f3-4683-99eb-48637eefa05b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
332122025-03-07T23:12:56.007ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "56d9f4e0-f4f3-4683-99eb-48637eefa05b", "content-length": "212", "date": "Fri, 07 Mar 2025 23:12:55 GMT"} })
332132025-03-07T23:12:56.007ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
332142025-03-07T23:12:56.007ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
332152025-03-07T23:12:56.007ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
332162025-03-07T23:12:56.023ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
332172025-03-07T23:12:56.023ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 98f8d76d-226d-4227-aa9e-508cf7188778 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
332182025-03-07T23:12:56.023ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
332192025-03-07T23:12:56.023ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332202025-03-07T23:12:56.024ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
332212025-03-07T23:12:56.024ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
332222025-03-07T23:12:56.025ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
332232025-03-07T23:12:56.026ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
332242025-03-07T23:12:56.027ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332252025-03-07T23:12:56.027ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
332262025-03-07T23:12:56.027ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
332272025-03-07T23:12:56.027ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
332282025-03-07T23:12:56.034ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 1 total_failed = 0 total_incomplete = 0 total_instances = 1 update_sagas_queued = 0
332292025-03-07T23:12:56.036ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 591.264526ms iteration = 3 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{"starting":1},"pruned_instances":0,"total_instances":1,"update_sagas_queued":0}
332302025-03-07T23:12:56.039ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332312025-03-07T23:12:56.039ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332322025-03-07T23:12:56.039ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332332025-03-07T23:12:56.040ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332342025-03-07T23:12:56.045ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
332352025-03-07T23:12:56.055ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
332362025-03-07T23:12:56.055ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
332372025-03-07T23:12:56.055ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
332382025-03-07T23:12:56.056ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
332392025-03-07T23:12:56.057ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
332402025-03-07T23:12:56.064ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
332412025-03-07T23:12:56.064ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
332422025-03-07T23:12:56.064ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
332432025-03-07T23:12:56.065ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
332442025-03-07T23:12:56.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
332452025-03-07T23:12:56.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
332462025-03-07T23:12:56.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332472025-03-07T23:12:56.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332482025-03-07T23:12:56.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332492025-03-07T23:12:56.073ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 98f8d76d-226d-4227-aa9e-508cf7188778 dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
332502025-03-07T23:12:56.073ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
332512025-03-07T23:12:56.074ZDEBGtest_unauthorized (BackgroundTasks): found latest DNS generation (unchanged) background_task = dns_config_internal current_generation = 1 current_time_created = 2025-03-07 23:11:57.759486 UTC dns_group = internal generation = 1
332522025-03-07T23:12:56.074ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 729.345465ms iteration = 3 status = {"generation":1}
332532025-03-07T23:12:56.116ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 670.574839ms iteration = 2 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
332542025-03-07T23:12:56.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
332552025-03-07T23:12:56.148ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
332562025-03-07T23:12:56.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332572025-03-07T23:12:56.148ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332582025-03-07T23:12:56.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332592025-03-07T23:12:56.154ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332602025-03-07T23:12:56.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332612025-03-07T23:12:56.154ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332622025-03-07T23:12:56.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332632025-03-07T23:12:56.155ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
332642025-03-07T23:12:56.155ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
332652025-03-07T23:12:56.156ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
332662025-03-07T23:12:56.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
332672025-03-07T23:12:56.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
332682025-03-07T23:12:56.161ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332692025-03-07T23:12:56.161ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332702025-03-07T23:12:56.161ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332712025-03-07T23:12:56.162ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332722025-03-07T23:12:56.165ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
332732025-03-07T23:12:56.165ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332742025-03-07T23:12:56.166ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
332752025-03-07T23:12:56.168ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
332762025-03-07T23:12:56.169ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
332772025-03-07T23:12:56.171ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332782025-03-07T23:12:56.171ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332792025-03-07T23:12:56.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332802025-03-07T23:12:56.175ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
332812025-03-07T23:12:56.202ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
332822025-03-07T23:12:56.203ZERROtest_unauthorized (BackgroundTasks): ipv6 addresses for service zone nat not implemented background_task = service_zone_nat_tracker
332832025-03-07T23:12:56.204ZERROtest_unauthorized (BackgroundTasks): generated config for fewer than the minimum allowed number of dns zones background_task = service_zone_nat_tracker
332842025-03-07T23:12:56.204ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 767.962014ms iteration = 3 status = {"error":"generated config for fewer than the minimum allowed number of dns zones"}
332852025-03-07T23:12:56.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332862025-03-07T23:12:56.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332872025-03-07T23:12:56.206ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
332882025-03-07T23:12:56.206ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {82888c06-1920-48a3-9e72-2ad13a44d89e: {10.0.0.1: {8da10816-b560-4a3a-b871-ab8d72aaaf74}, 10.0.0.0: {8da10816-b560-4a3a-b871-ab8d72aaaf74}}} background_task = vpc_route_manager sled = sim-b6d65341
332892025-03-07T23:12:56.206ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/eip-gateways
332902025-03-07T23:12:56.218ZDEBGtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (no change) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:11:52.978055Z, time_modified: 2025-03-07T23:11:52.978055Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(2)) }, tls_certs: [TlsCertificate { digest: "a89b485d12b1fc30f132f51f96746442e44511f1cf71bf704eac926b83c469c0" }] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, db_silo: Silo { identity: SiloIdentity { id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:12:06.686087Z, time_modified: 2025-03-07T23:12:06.686087Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 9d15cba3-0ce9-4052-9d95-bc0faa728916, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, db_silo: Silo { identity: SiloIdentity { id: 0bb91424-f90c-4f11-acbb-98367ae5ccd9, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:11:59.284312Z, time_modified: 2025-03-07T23:11:59.284312Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
332912025-03-07T23:12:56.218ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 783.562492ms iteration = 5 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":["a89b485d12b1fc30f132f51f96746442e44511f1cf71bf704eac926b83c469c0"]},"demo-silo.sys.oxide-dev.test":{"silo_id":"9d15cba3-0ce9-4052-9d95-bc0faa728916","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]}},"default_endpoint":{"silo_id":"0bb91424-f90c-4f11-acbb-98367ae5ccd9","tls_certs":[]},"warnings":["silo 9d15cba3-0ce9-4052-9d95-bc0faa728916 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0bb91424-f90c-4f11-acbb-98367ae5ccd9 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
332922025-03-07T23:12:56.218ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
332932025-03-07T23:12:56.218ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 0 version = 3
332942025-03-07T23:12:56.219ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
332952025-03-07T23:12:56.219ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332962025-03-07T23:12:56.219ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
332972025-03-07T23:12:56.219ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
332982025-03-07T23:12:56.220ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
332992025-03-07T23:12:56.221ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34830 req_id = 1243cdd0-8662-4f4f-93d9-4af20e66d164 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
333002025-03-07T23:12:56.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
333012025-03-07T23:12:56.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
333022025-03-07T23:12:56.221ZINFOtest_unauthorized (dropshot): request completed latency_us = 470 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34830 req_id = 1243cdd0-8662-4f4f-93d9-4af20e66d164 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
333032025-03-07T23:12:56.221ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
333042025-03-07T23:12:56.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
333052025-03-07T23:12:56.224ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333062025-03-07T23:12:56.224ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333072025-03-07T23:12:56.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333082025-03-07T23:12:56.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333092025-03-07T23:12:56.225ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333102025-03-07T23:12:56.225ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
333112025-03-07T23:12:56.233ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
333122025-03-07T23:12:56.234ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
333132025-03-07T23:12:56.234ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
333142025-03-07T23:12:56.234ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
333152025-03-07T23:12:56.236ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/eip-gateways", status: 204, headers: {"x-request-id": "1243cdd0-8662-4f4f-93d9-4af20e66d164", "date": "Fri, 07 Mar 2025 23:12:56 GMT"} })
333162025-03-07T23:12:56.237ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
333172025-03-07T23:12:56.237ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
333182025-03-07T23:12:56.237ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
333192025-03-07T23:12:56.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333202025-03-07T23:12:56.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333212025-03-07T23:12:56.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333222025-03-07T23:12:56.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333232025-03-07T23:12:56.241ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
333242025-03-07T23:12:56.242ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
333252025-03-07T23:12:56.242ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 064d031a-74b3-4865-b1e8-6b1be408155a dns_zone_name = oxide-dev.test found_so_far = 2 version = 3
333262025-03-07T23:12:56.242ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 3
333272025-03-07T23:12:56.242ZDEBGtest_unauthorized (BackgroundTasks): found latest DNS generation (unchanged) background_task = dns_config_external current_generation = 3 current_time_created = 2025-03-07 23:12:06.865072 UTC dns_group = external generation = 3
333282025-03-07T23:12:56.242ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 848.749545ms iteration = 4 status = {"generation":3}
333292025-03-07T23:12:56.242ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
333302025-03-07T23:12:56.242ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
333312025-03-07T23:12:56.255ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
333322025-03-07T23:12:56.263ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333332025-03-07T23:12:56.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333342025-03-07T23:12:56.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333352025-03-07T23:12:56.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333362025-03-07T23:12:56.268ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
333372025-03-07T23:12:56.268ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
333382025-03-07T23:12:56.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333392025-03-07T23:12:56.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333402025-03-07T23:12:56.306ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 750184 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 2dac0ed8-2e9a-4e20-87b4-feae44048d5e response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333412025-03-07T23:12:56.308ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
333422025-03-07T23:12:56.309ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
333432025-03-07T23:12:56.309ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
333442025-03-07T23:12:56.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
333452025-03-07T23:12:56.316ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
333462025-03-07T23:12:56.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
333472025-03-07T23:12:56.316ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
333482025-03-07T23:12:56.317ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
333492025-03-07T23:12:56.318ZINFOtest_unauthorized (external client test context): client received response status = 404
333502025-03-07T23:12:56.319ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333512025-03-07T23:12:56.319ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
333522025-03-07T23:12:56.319ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2c0f2cf-a423-494a-bfb9-8f7b966ba487 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333532025-03-07T23:12:56.320ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2c0f2cf-a423-494a-bfb9-8f7b966ba487 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333542025-03-07T23:12:56.320ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2c0f2cf-a423-494a-bfb9-8f7b966ba487 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333552025-03-07T23:12:56.320ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2c0f2cf-a423-494a-bfb9-8f7b966ba487 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333562025-03-07T23:12:56.320ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1189 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b2c0f2cf-a423-494a-bfb9-8f7b966ba487 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333572025-03-07T23:12:56.321ZINFOtest_unauthorized (external client test context): client received response status = 401
333582025-03-07T23:12:56.321ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333592025-03-07T23:12:56.322ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
333602025-03-07T23:12:56.322ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 push not needed background_task = vpc_route_manager
333612025-03-07T23:12:56.322ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:41065/vpc-routes
333622025-03-07T23:12:56.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 240144d3-b6d3-4b5d-8720-088a0240bc4d uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333632025-03-07T23:12:56.336ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34830 req_id = cdeb4dd3-64b0-4a6e-9f22-976c440e4668 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
333642025-03-07T23:12:56.336ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 240144d3-b6d3-4b5d-8720-088a0240bc4d uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333652025-03-07T23:12:56.336ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 240144d3-b6d3-4b5d-8720-088a0240bc4d uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333662025-03-07T23:12:56.336ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
333672025-03-07T23:12:56.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1099 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 240144d3-b6d3-4b5d-8720-088a0240bc4d response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333682025-03-07T23:12:56.336ZINFOtest_unauthorized (dropshot): request completed latency_us = 1003 local_addr = [::1]:41065 method = PUT remote_addr = [::1]:34830 req_id = cdeb4dd3-64b0-4a6e-9f22-976c440e4668 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
333692025-03-07T23:12:56.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
333702025-03-07T23:12:56.339ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
333712025-03-07T23:12:56.339ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
333722025-03-07T23:12:56.339ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
333732025-03-07T23:12:56.339ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
333742025-03-07T23:12:56.340ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
333752025-03-07T23:12:56.340ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
333762025-03-07T23:12:56.341ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:41065/vpc-routes", status: 204, headers: {"x-request-id": "cdeb4dd3-64b0-4a6e-9f22-976c440e4668", "date": "Fri, 07 Mar 2025 23:12:56 GMT"} })
333772025-03-07T23:12:56.344ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 903.740683ms iteration = 7 status = {}
333782025-03-07T23:12:56.348ZINFOtest_unauthorized (external client test context): client received response status = 401
333792025-03-07T23:12:56.348ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333802025-03-07T23:12:56.351ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
333812025-03-07T23:12:56.356ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
333822025-03-07T23:12:56.361ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
333832025-03-07T23:12:56.375ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
333842025-03-07T23:12:56.376ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
333852025-03-07T23:12:56.377ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
333862025-03-07T23:12:56.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 31a08991-087d-4270-8ee9-1d52e61e852e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333872025-03-07T23:12:56.379ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 31a08991-087d-4270-8ee9-1d52e61e852e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333882025-03-07T23:12:56.379ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1947:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1967:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 31a08991-087d-4270-8ee9-1d52e61e852e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333892025-03-07T23:12:56.379ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1447 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 31a08991-087d-4270-8ee9-1d52e61e852e response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333902025-03-07T23:12:56.379ZINFOtest_unauthorized (external client test context): client received response status = 401
333912025-03-07T23:12:56.379ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333922025-03-07T23:12:56.380ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
333932025-03-07T23:12:56.380ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ba591de6-a7fe-4921-b26d-3616b1b79ebd uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333942025-03-07T23:12:56.381ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ba591de6-a7fe-4921-b26d-3616b1b79ebd response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333952025-03-07T23:12:56.381ZINFOtest_unauthorized (external client test context): client received response status = 405
333962025-03-07T23:12:56.381ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333972025-03-07T23:12:56.381ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
333982025-03-07T23:12:56.381ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1967b036-22f3-4a5b-80dc-1ca665c14dc1 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
333992025-03-07T23:12:56.381ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 1967b036-22f3-4a5b-80dc-1ca665c14dc1 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334002025-03-07T23:12:56.381ZINFOtest_unauthorized (external client test context): client received response status = 405
334012025-03-07T23:12:56.381ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334022025-03-07T23:12:56.381ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334032025-03-07T23:12:56.382ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0684361c-6657-462f-8332-691cb7f6e2cc uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334042025-03-07T23:12:56.382ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0684361c-6657-462f-8332-691cb7f6e2cc response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334052025-03-07T23:12:56.382ZINFOtest_unauthorized (external client test context): client received response status = 405
334062025-03-07T23:12:56.382ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334072025-03-07T23:12:56.382ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334082025-03-07T23:12:56.463ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:41065/v2p
334092025-03-07T23:12:56.465ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 81c9cfae-c170-4ba4-9659-4c5d9366dadc uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334102025-03-07T23:12:56.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 108 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 81c9cfae-c170-4ba4-9659-4c5d9366dadc response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334112025-03-07T23:12:56.466ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:41065 remote_addr = [::1]:34832 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
334122025-03-07T23:12:56.466ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:41065 method = GET remote_addr = [::1]:34832 req_id = 2e850bb9-e5cb-4060-ae95-c9691ad579be sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
334132025-03-07T23:12:56.466ZINFOtest_unauthorized (dropshot): request completed latency_us = 192 local_addr = [::1]:41065 method = GET remote_addr = [::1]:34832 req_id = 2e850bb9-e5cb-4060-ae95-c9691ad579be response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
334142025-03-07T23:12:56.466ZINFOtest_unauthorized (external client test context): client received response status = 405
334152025-03-07T23:12:56.466ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334162025-03-07T23:12:56.466ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334172025-03-07T23:12:56.466ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:41065/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "2e850bb9-e5cb-4060-ae95-c9691ad579be", "content-length": "102", "date": "Fri, 07 Mar 2025 23:12:56 GMT"} })
334182025-03-07T23:12:56.466ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(4187191) }} sled = sim-b6d65341
334192025-03-07T23:12:56.466ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
334202025-03-07T23:12:56.466ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
334212025-03-07T23:12:56.469ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 1.025774473s iteration = 4 status = {}
334222025-03-07T23:12:56.470ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f8fd8011-0a99-4dbc-a172-5e8812ebbf3b uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334232025-03-07T23:12:56.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1821 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f8fd8011-0a99-4dbc-a172-5e8812ebbf3b response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334242025-03-07T23:12:56.473ZINFOtest_unauthorized (external client test context): client received response status = 405
334252025-03-07T23:12:56.473ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334262025-03-07T23:12:56.473ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334272025-03-07T23:12:56.473ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ff5cfafd-b5b2-4e0c-90cd-466bc73fd409 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334282025-03-07T23:12:56.473ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ff5cfafd-b5b2-4e0c-90cd-466bc73fd409 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334292025-03-07T23:12:56.473ZINFOtest_unauthorized (external client test context): client received response status = 405
334302025-03-07T23:12:56.473ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334312025-03-07T23:12:56.473ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334322025-03-07T23:12:56.473ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ccadc384-fd27-4603-be64-413bcd228d0d uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334332025-03-07T23:12:56.473ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ccadc384-fd27-4603-be64-413bcd228d0d response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334342025-03-07T23:12:56.473ZINFOtest_unauthorized (external client test context): client received response status = 405
334352025-03-07T23:12:56.474ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334362025-03-07T23:12:56.474ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write?project=demo-project
334372025-03-07T23:12:56.474ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a16493b8-9eb0-47d4-9ebb-b39764bf1162 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334382025-03-07T23:12:56.475ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a16493b8-9eb0-47d4-9ebb-b39764bf1162 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334392025-03-07T23:12:56.475ZINFOtest_unauthorized (external client test context): client received response status = 405
334402025-03-07T23:12:56.475ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
334412025-03-07T23:12:56.475ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334422025-03-07T23:12:56.475ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334432025-03-07T23:12:56.476ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334442025-03-07T23:12:56.476ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334452025-03-07T23:12:56.476ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4587603-3f56-43e7-8e2c-3a0bf24424fe uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334462025-03-07T23:12:56.476ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b4587603-3f56-43e7-8e2c-3a0bf24424fe response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334472025-03-07T23:12:56.476ZINFOtest_unauthorized (external client test context): client received response status = 405
334482025-03-07T23:12:56.476ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334492025-03-07T23:12:56.476ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334502025-03-07T23:12:56.476ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49662a11-695b-4acc-822c-2eba1193227a uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334512025-03-07T23:12:56.477ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 49662a11-695b-4acc-822c-2eba1193227a response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334522025-03-07T23:12:56.477ZINFOtest_unauthorized (external client test context): client received response status = 405
334532025-03-07T23:12:56.477ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334542025-03-07T23:12:56.477ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334552025-03-07T23:12:56.477ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd450937-d155-4504-8766-e5f84b9a311b uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334562025-03-07T23:12:56.477ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bd450937-d155-4504-8766-e5f84b9a311b response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334572025-03-07T23:12:56.477ZINFOtest_unauthorized (external client test context): client received response status = 405
334582025-03-07T23:12:56.477ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334592025-03-07T23:12:56.477ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334602025-03-07T23:12:56.477ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63bb15ed-fdef-4930-9ea9-363462bdea32 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334612025-03-07T23:12:56.478ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63bb15ed-fdef-4930-9ea9-363462bdea32 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334622025-03-07T23:12:56.478ZINFOtest_unauthorized (external client test context): client received response status = 405
334632025-03-07T23:12:56.478ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334642025-03-07T23:12:56.478ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334652025-03-07T23:12:56.479ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 65739f70-5101-476e-af0d-0554ffeedb1c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334662025-03-07T23:12:56.479ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 65739f70-5101-476e-af0d-0554ffeedb1c response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334672025-03-07T23:12:56.479ZINFOtest_unauthorized (external client test context): client received response status = 405
334682025-03-07T23:12:56.479ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334692025-03-07T23:12:56.479ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334702025-03-07T23:12:56.486ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 896ea8e4-8502-4d79-bb4f-b2c11b390623 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334712025-03-07T23:12:56.486ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 296 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 896ea8e4-8502-4d79-bb4f-b2c11b390623 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334722025-03-07T23:12:56.487ZINFOtest_unauthorized (external client test context): client received response status = 405
334732025-03-07T23:12:56.487ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334742025-03-07T23:12:56.487ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334752025-03-07T23:12:56.488ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 461c7264-38c9-41ce-b265-8bc9e3a2d4af uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334762025-03-07T23:12:56.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 183 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 461c7264-38c9-41ce-b265-8bc9e3a2d4af response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334772025-03-07T23:12:56.489ZINFOtest_unauthorized (external client test context): client received response status = 405
334782025-03-07T23:12:56.489ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334792025-03-07T23:12:56.489ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334802025-03-07T23:12:56.490ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 56f6d740-bfe9-4b94-b204-b26195ff843c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334812025-03-07T23:12:56.490ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 56f6d740-bfe9-4b94-b204-b26195ff843c response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334822025-03-07T23:12:56.490ZINFOtest_unauthorized (external client test context): client received response status = 405
334832025-03-07T23:12:56.490ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334842025-03-07T23:12:56.490ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334852025-03-07T23:12:56.490ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334862025-03-07T23:12:56.490ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334872025-03-07T23:12:56.491ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
334882025-03-07T23:12:56.491ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334892025-03-07T23:12:56.491ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334902025-03-07T23:12:56.493ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334912025-03-07T23:12:56.496ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334922025-03-07T23:12:56.497ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334932025-03-07T23:12:56.497ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334942025-03-07T23:12:56.500ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
334952025-03-07T23:12:56.500ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
334962025-03-07T23:12:56.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334972025-03-07T23:12:56.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334982025-03-07T23:12:56.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334992025-03-07T23:12:56.503ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
335002025-03-07T23:12:56.504ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335012025-03-07T23:12:56.504ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335022025-03-07T23:12:56.507ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335032025-03-07T23:12:56.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
335042025-03-07T23:12:56.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
335052025-03-07T23:12:56.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335062025-03-07T23:12:56.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335072025-03-07T23:12:56.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335082025-03-07T23:12:56.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
335092025-03-07T23:12:56.535ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
335102025-03-07T23:12:56.535ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335112025-03-07T23:12:56.535ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335122025-03-07T23:12:56.536ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335132025-03-07T23:12:56.542ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
335142025-03-07T23:12:56.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335152025-03-07T23:12:56.542ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335162025-03-07T23:12:56.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335172025-03-07T23:12:56.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
335182025-03-07T23:12:56.550ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
335192025-03-07T23:12:56.560ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335202025-03-07T23:12:56.560ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335212025-03-07T23:12:56.560ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335222025-03-07T23:12:56.564ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335232025-03-07T23:12:56.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335242025-03-07T23:12:56.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335252025-03-07T23:12:56.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335262025-03-07T23:12:56.584ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335272025-03-07T23:12:56.585ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335282025-03-07T23:12:56.586ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335292025-03-07T23:12:56.587ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335302025-03-07T23:12:56.588ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335312025-03-07T23:12:56.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335322025-03-07T23:12:56.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335332025-03-07T23:12:56.592ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335342025-03-07T23:12:56.592ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
335352025-03-07T23:12:56.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335362025-03-07T23:12:56.595ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335372025-03-07T23:12:56.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335382025-03-07T23:12:56.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335392025-03-07T23:12:56.596ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335402025-03-07T23:12:56.604ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335412025-03-07T23:12:56.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335422025-03-07T23:12:56.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335432025-03-07T23:12:56.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335442025-03-07T23:12:56.616ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335452025-03-07T23:12:56.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335462025-03-07T23:12:56.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335472025-03-07T23:12:56.620ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335482025-03-07T23:12:56.628ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335492025-03-07T23:12:56.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335502025-03-07T23:12:56.660ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 171149 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d34b8fda-846e-4e7c-8d85-67536829c3fb response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335512025-03-07T23:12:56.661ZINFOtest_unauthorized (external client test context): client received response status = 404
335522025-03-07T23:12:56.661ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335532025-03-07T23:12:56.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335542025-03-07T23:12:56.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 24311f7c-cf61-4634-b813-0d6616e6f4b1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335552025-03-07T23:12:56.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 24311f7c-cf61-4634-b813-0d6616e6f4b1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335562025-03-07T23:12:56.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 24311f7c-cf61-4634-b813-0d6616e6f4b1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335572025-03-07T23:12:56.662ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 24311f7c-cf61-4634-b813-0d6616e6f4b1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335582025-03-07T23:12:56.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 477 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 24311f7c-cf61-4634-b813-0d6616e6f4b1 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335592025-03-07T23:12:56.663ZINFOtest_unauthorized (external client test context): client received response status = 401
335602025-03-07T23:12:56.663ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335612025-03-07T23:12:56.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335622025-03-07T23:12:56.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64e3ce04-d53b-4a13-a1ef-ab14e99a7649 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335632025-03-07T23:12:56.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64e3ce04-d53b-4a13-a1ef-ab14e99a7649 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335642025-03-07T23:12:56.664ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64e3ce04-d53b-4a13-a1ef-ab14e99a7649 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335652025-03-07T23:12:56.664ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 391 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 64e3ce04-d53b-4a13-a1ef-ab14e99a7649 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335662025-03-07T23:12:56.664ZINFOtest_unauthorized (external client test context): client received response status = 401
335672025-03-07T23:12:56.664ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335682025-03-07T23:12:56.664ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335692025-03-07T23:12:56.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a89d1943-d083-4403-9bff-d542a040b1ff uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335702025-03-07T23:12:56.665ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a89d1943-d083-4403-9bff-d542a040b1ff uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335712025-03-07T23:12:56.666ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1978:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1997:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a89d1943-d083-4403-9bff-d542a040b1ff uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335722025-03-07T23:12:56.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1594 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a89d1943-d083-4403-9bff-d542a040b1ff response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335732025-03-07T23:12:56.666ZINFOtest_unauthorized (external client test context): client received response status = 401
335742025-03-07T23:12:56.666ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335752025-03-07T23:12:56.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335762025-03-07T23:12:56.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8880c99b-3f85-4373-bfc5-4bff05b72282 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335772025-03-07T23:12:56.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8880c99b-3f85-4373-bfc5-4bff05b72282 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335782025-03-07T23:12:56.667ZINFOtest_unauthorized (external client test context): client received response status = 405
335792025-03-07T23:12:56.667ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335802025-03-07T23:12:56.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335812025-03-07T23:12:56.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 480d0a82-0c51-4b0c-805f-d2549ce87aea uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335822025-03-07T23:12:56.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 480d0a82-0c51-4b0c-805f-d2549ce87aea response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335832025-03-07T23:12:56.669ZINFOtest_unauthorized (external client test context): client received response status = 405
335842025-03-07T23:12:56.669ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335852025-03-07T23:12:56.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335862025-03-07T23:12:56.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 32656d05-d22e-45c2-930f-b5920fce5455 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335872025-03-07T23:12:56.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 32656d05-d22e-45c2-930f-b5920fce5455 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335882025-03-07T23:12:56.669ZINFOtest_unauthorized (external client test context): client received response status = 405
335892025-03-07T23:12:56.669ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335902025-03-07T23:12:56.669ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335912025-03-07T23:12:56.669ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9592e359-4673-4ef7-88a7-903d04eb1ec4 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335922025-03-07T23:12:56.670ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 9592e359-4673-4ef7-88a7-903d04eb1ec4 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335932025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client received response status = 405
335942025-03-07T23:12:56.671ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335952025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335962025-03-07T23:12:56.671ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5ac493e6-452a-4881-9911-8f074b50de6b uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335972025-03-07T23:12:56.671ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5ac493e6-452a-4881-9911-8f074b50de6b response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
335982025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client received response status = 405
335992025-03-07T23:12:56.671ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336002025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336012025-03-07T23:12:56.671ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d2710b3-3075-4a88-9569-cb897d8da5d2 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336022025-03-07T23:12:56.671ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d2710b3-3075-4a88-9569-cb897d8da5d2 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336032025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client received response status = 405
336042025-03-07T23:12:56.671ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336052025-03-07T23:12:56.671ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336062025-03-07T23:12:56.671ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ced980aa-b29c-405f-835c-c48ab36f94cd uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336072025-03-07T23:12:56.671ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ced980aa-b29c-405f-835c-c48ab36f94cd response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336082025-03-07T23:12:56.672ZINFOtest_unauthorized (external client test context): client received response status = 405
336092025-03-07T23:12:56.672ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336102025-03-07T23:12:56.672ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336112025-03-07T23:12:56.672ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f22cb76-8b9e-4056-9df9-c06935d69607 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336122025-03-07T23:12:56.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f22cb76-8b9e-4056-9df9-c06935d69607 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336132025-03-07T23:12:56.673ZINFOtest_unauthorized (external client test context): client received response status = 405
336142025-03-07T23:12:56.673ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
336152025-03-07T23:12:56.674ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/finalize?project=demo-project
336162025-03-07T23:12:56.674ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/finalize?project=demo-project
336172025-03-07T23:12:56.674ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
336182025-03-07T23:12:56.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336192025-03-07T23:12:56.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c34373f-db2c-4ff9-a8ec-bcaf5ee18970 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336202025-03-07T23:12:56.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7c34373f-db2c-4ff9-a8ec-bcaf5ee18970 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336212025-03-07T23:12:56.674ZINFOtest_unauthorized (external client test context): client received response status = 405
336222025-03-07T23:12:56.674ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
336232025-03-07T23:12:56.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336242025-03-07T23:12:56.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b711004a-7115-4ff1-8599-992aad98152f uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336252025-03-07T23:12:56.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b711004a-7115-4ff1-8599-992aad98152f response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336262025-03-07T23:12:56.675ZINFOtest_unauthorized (external client test context): client received response status = 405
336272025-03-07T23:12:56.675ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
336282025-03-07T23:12:56.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336292025-03-07T23:12:56.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3d3299b4-ddd4-45f7-b52c-97a88853e5e0 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336302025-03-07T23:12:56.676ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3d3299b4-ddd4-45f7-b52c-97a88853e5e0 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336312025-03-07T23:12:56.676ZINFOtest_unauthorized (external client test context): client received response status = 405
336322025-03-07T23:12:56.676ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
336332025-03-07T23:12:56.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336342025-03-07T23:12:56.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45566420-9e8a-4fdb-b35d-0151775ce961 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336352025-03-07T23:12:56.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 45566420-9e8a-4fdb-b35d-0151775ce961 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336362025-03-07T23:12:56.677ZINFOtest_unauthorized (external client test context): client received response status = 405
336372025-03-07T23:12:56.677ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
336382025-03-07T23:12:56.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336392025-03-07T23:12:56.677ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b12ebade-7438-4cc5-bbfe-0f549c792c9e uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336402025-03-07T23:12:56.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b12ebade-7438-4cc5-bbfe-0f549c792c9e response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336412025-03-07T23:12:56.677ZINFOtest_unauthorized (external client test context): client received response status = 405
336422025-03-07T23:12:56.677ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
336432025-03-07T23:12:56.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336442025-03-07T23:12:56.677ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cbd23309-fdad-4610-92c9-dd4765933c8a uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336452025-03-07T23:12:56.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cbd23309-fdad-4610-92c9-dd4765933c8a response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336462025-03-07T23:12:56.677ZINFOtest_unauthorized (external client test context): client received response status = 405
336472025-03-07T23:12:56.677ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
336482025-03-07T23:12:56.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336492025-03-07T23:12:56.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cee71b29-1aee-480b-878d-6487eeec4725 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336502025-03-07T23:12:56.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cee71b29-1aee-480b-878d-6487eeec4725 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336512025-03-07T23:12:56.678ZINFOtest_unauthorized (external client test context): client received response status = 405
336522025-03-07T23:12:56.678ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
336532025-03-07T23:12:56.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336542025-03-07T23:12:56.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3e967071-3ba0-4b4b-8a72-1bb50b1adfdd uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336552025-03-07T23:12:56.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3e967071-3ba0-4b4b-8a72-1bb50b1adfdd response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336562025-03-07T23:12:56.678ZINFOtest_unauthorized (external client test context): client received response status = 405
336572025-03-07T23:12:56.678ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
336582025-03-07T23:12:56.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
336592025-03-07T23:12:56.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336602025-03-07T23:12:56.678ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336612025-03-07T23:12:56.679ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336622025-03-07T23:12:56.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336632025-03-07T23:12:56.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336642025-03-07T23:12:56.679ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336652025-03-07T23:12:56.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336662025-03-07T23:12:56.680ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336672025-03-07T23:12:56.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336682025-03-07T23:12:56.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
336692025-03-07T23:12:56.689ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
336702025-03-07T23:12:56.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336712025-03-07T23:12:56.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336722025-03-07T23:12:56.689ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336732025-03-07T23:12:56.690ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
336742025-03-07T23:12:56.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336752025-03-07T23:12:56.692ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336762025-03-07T23:12:56.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336772025-03-07T23:12:56.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
336782025-03-07T23:12:56.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
336792025-03-07T23:12:56.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336802025-03-07T23:12:56.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336812025-03-07T23:12:56.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336822025-03-07T23:12:56.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
336832025-03-07T23:12:56.709ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
336842025-03-07T23:12:56.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336852025-03-07T23:12:56.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336862025-03-07T23:12:56.712ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336872025-03-07T23:12:56.716ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
336882025-03-07T23:12:56.716ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336892025-03-07T23:12:56.716ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336902025-03-07T23:12:56.717ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336912025-03-07T23:12:56.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
336922025-03-07T23:12:56.731ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
336932025-03-07T23:12:56.731ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336942025-03-07T23:12:56.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336952025-03-07T23:12:56.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336962025-03-07T23:12:56.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336972025-03-07T23:12:56.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336982025-03-07T23:12:56.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
336992025-03-07T23:12:56.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337002025-03-07T23:12:56.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337012025-03-07T23:12:56.738ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337022025-03-07T23:12:56.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337032025-03-07T23:12:56.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337042025-03-07T23:12:56.741ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337052025-03-07T23:12:56.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337062025-03-07T23:12:56.741ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337072025-03-07T23:12:56.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337082025-03-07T23:12:56.754ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337092025-03-07T23:12:56.755ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337102025-03-07T23:12:56.755ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337112025-03-07T23:12:56.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337122025-03-07T23:12:56.765ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337132025-03-07T23:12:56.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337142025-03-07T23:12:56.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337152025-03-07T23:12:56.767ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337162025-03-07T23:12:56.775ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337172025-03-07T23:12:56.798ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 6e8051cc-c280-4e8f-85ea-46ebfa72f7f3, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337182025-03-07T23:12:56.798ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 120756 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = feb7ef56-a262-4257-8a67-343d0df35f3c response_code = 404 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337192025-03-07T23:12:56.801ZINFOtest_unauthorized (external client test context): client received response status = 404
337202025-03-07T23:12:56.802ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
337212025-03-07T23:12:56.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337222025-03-07T23:12:56.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 806ac86b-59ba-421f-a402-54bdd8f478ba uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337232025-03-07T23:12:56.804ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 806ac86b-59ba-421f-a402-54bdd8f478ba uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337242025-03-07T23:12:56.804ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 806ac86b-59ba-421f-a402-54bdd8f478ba uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337252025-03-07T23:12:56.804ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 806ac86b-59ba-421f-a402-54bdd8f478ba uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337262025-03-07T23:12:56.804ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1994 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 806ac86b-59ba-421f-a402-54bdd8f478ba response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337272025-03-07T23:12:56.805ZINFOtest_unauthorized (external client test context): client received response status = 401
337282025-03-07T23:12:56.806ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
337292025-03-07T23:12:56.806ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337302025-03-07T23:12:56.812ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f8276452-a8c3-4958-83b3-343e2b7c6601 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337312025-03-07T23:12:56.812ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f8276452-a8c3-4958-83b3-343e2b7c6601 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337322025-03-07T23:12:56.812ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f8276452-a8c3-4958-83b3-343e2b7c6601 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337332025-03-07T23:12:56.813ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 892 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f8276452-a8c3-4958-83b3-343e2b7c6601 response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337342025-03-07T23:12:56.817ZINFOtest_unauthorized (external client test context): client received response status = 401
337352025-03-07T23:12:56.817ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
337362025-03-07T23:12:56.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337372025-03-07T23:12:56.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d2cf91b6-5ace-4da3-8bee-115e50f16671 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337382025-03-07T23:12:56.818ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d2cf91b6-5ace-4da3-8bee-115e50f16671 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337392025-03-07T23:12:56.820ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2009:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2028:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d2cf91b6-5ace-4da3-8bee-115e50f16671 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337402025-03-07T23:12:56.820ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1038 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d2cf91b6-5ace-4da3-8bee-115e50f16671 response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337412025-03-07T23:12:56.820ZINFOtest_unauthorized (external client test context): client received response status = 401
337422025-03-07T23:12:56.820ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337432025-03-07T23:12:56.820ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337442025-03-07T23:12:56.820ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 61fc81d2-6367-44f4-94c8-6c6b6b1a9b16 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337452025-03-07T23:12:56.820ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 61fc81d2-6367-44f4-94c8-6c6b6b1a9b16 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337462025-03-07T23:12:56.820ZINFOtest_unauthorized (external client test context): client received response status = 405
337472025-03-07T23:12:56.820ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337482025-03-07T23:12:56.820ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337492025-03-07T23:12:56.820ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0ada1600-911e-41ed-881e-4e84c232b9f7 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337502025-03-07T23:12:56.820ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0ada1600-911e-41ed-881e-4e84c232b9f7 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337512025-03-07T23:12:56.821ZINFOtest_unauthorized (external client test context): client received response status = 405
337522025-03-07T23:12:56.821ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337532025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337542025-03-07T23:12:56.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45aaceba-d32c-4bd4-a236-a54e3b4bc35c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337552025-03-07T23:12:56.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 45aaceba-d32c-4bd4-a236-a54e3b4bc35c response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337562025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client received response status = 405
337572025-03-07T23:12:56.822ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337582025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337592025-03-07T23:12:56.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e34995c3-f585-4258-af2f-e6b91c113974 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337602025-03-07T23:12:56.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e34995c3-f585-4258-af2f-e6b91c113974 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337612025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client received response status = 405
337622025-03-07T23:12:56.822ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337632025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337642025-03-07T23:12:56.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1a30bb57-f283-43b6-8b9f-845092cddcd9 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337652025-03-07T23:12:56.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1a30bb57-f283-43b6-8b9f-845092cddcd9 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337662025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client received response status = 405
337672025-03-07T23:12:56.822ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337682025-03-07T23:12:56.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337692025-03-07T23:12:56.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0726ebb3-ac1c-4bf6-8393-4e86a3a6b74d uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337702025-03-07T23:12:56.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0726ebb3-ac1c-4bf6-8393-4e86a3a6b74d response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337712025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client received response status = 405
337722025-03-07T23:12:56.824ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337732025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337742025-03-07T23:12:56.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5631240a-d9ca-4146-af1b-cf40947b0226 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337752025-03-07T23:12:56.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5631240a-d9ca-4146-af1b-cf40947b0226 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337762025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client received response status = 405
337772025-03-07T23:12:56.824ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
337782025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/disks/demo-import-disk/finalize?project=demo-project
337792025-03-07T23:12:56.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4d33d995-0f14-4cbc-987e-2449c7ac5491 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337802025-03-07T23:12:56.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4d33d995-0f14-4cbc-987e-2449c7ac5491 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
337812025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client received response status = 405
337822025-03-07T23:12:56.824ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/finalize?project=demo-project
337832025-03-07T23:12:56.824ZINFOtest_unauthorized: test: begin endpoint url = /v1/images?project=demo-project
337842025-03-07T23:12:56.824ZINFOtest_unauthorized: test: privileged GET url = /v1/images?project=demo-project
337852025-03-07T23:12:56.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
337862025-03-07T23:12:56.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 uri = /v1/images?project=demo-project
337872025-03-07T23:12:56.824ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 uri = /v1/images?project=demo-project
337882025-03-07T23:12:56.824ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
337892025-03-07T23:12:56.824ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337902025-03-07T23:12:56.825ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337912025-03-07T23:12:56.826ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337922025-03-07T23:12:56.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337932025-03-07T23:12:56.828ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337942025-03-07T23:12:56.828ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337952025-03-07T23:12:56.831ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
337962025-03-07T23:12:56.831ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
337972025-03-07T23:12:56.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337982025-03-07T23:12:56.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337992025-03-07T23:12:56.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338002025-03-07T23:12:56.834ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
338012025-03-07T23:12:56.834ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338022025-03-07T23:12:56.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338032025-03-07T23:12:56.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338042025-03-07T23:12:56.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
338052025-03-07T23:12:56.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
338062025-03-07T23:12:56.841ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338072025-03-07T23:12:56.841ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338082025-03-07T23:12:56.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338092025-03-07T23:12:56.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
338102025-03-07T23:12:56.844ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
338112025-03-07T23:12:56.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338122025-03-07T23:12:56.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338132025-03-07T23:12:56.846ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338142025-03-07T23:12:56.848ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
338152025-03-07T23:12:56.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338162025-03-07T23:12:56.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338172025-03-07T23:12:56.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338182025-03-07T23:12:56.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
338192025-03-07T23:12:56.857ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
338202025-03-07T23:12:56.858ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 uri = /v1/images?project=demo-project
338212025-03-07T23:12:56.858ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338222025-03-07T23:12:56.858ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338232025-03-07T23:12:56.858ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338242025-03-07T23:12:56.860ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338252025-03-07T23:12:56.860ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338262025-03-07T23:12:56.862ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338272025-03-07T23:12:56.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
338282025-03-07T23:12:56.866ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
338292025-03-07T23:12:56.866ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338302025-03-07T23:12:56.866ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338312025-03-07T23:12:56.866ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338322025-03-07T23:12:56.870ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
338332025-03-07T23:12:56.870ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338342025-03-07T23:12:56.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338352025-03-07T23:12:56.871ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338362025-03-07T23:12:56.874ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
338372025-03-07T23:12:56.874ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338382025-03-07T23:12:56.874ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338392025-03-07T23:12:56.874ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338402025-03-07T23:12:56.879ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
338412025-03-07T23:12:56.879ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
338422025-03-07T23:12:56.880ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
338432025-03-07T23:12:56.880ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
338442025-03-07T23:12:56.880ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
338452025-03-07T23:12:56.880ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
338462025-03-07T23:12:56.880ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
338472025-03-07T23:12:56.880ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
338482025-03-07T23:12:56.880ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
338492025-03-07T23:12:56.880ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
338502025-03-07T23:12:56.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
338512025-03-07T23:12:56.890ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
338522025-03-07T23:12:56.890ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
338532025-03-07T23:12:56.890ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338542025-03-07T23:12:56.890ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338552025-03-07T23:12:56.891ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338562025-03-07T23:12:56.896ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
338572025-03-07T23:12:56.897ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338582025-03-07T23:12:56.897ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338592025-03-07T23:12:56.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338602025-03-07T23:12:56.907ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
338612025-03-07T23:12:56.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338622025-03-07T23:12:56.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338632025-03-07T23:12:56.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338642025-03-07T23:12:56.915ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
338652025-03-07T23:12:56.918ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
338662025-03-07T23:12:56.918ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database uri = /v1/images?project=demo-project
338672025-03-07T23:12:56.918ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
338682025-03-07T23:12:56.919ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
338692025-03-07T23:12:56.935ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 110402 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3c00ade4-a878-4b17-86ad-bea642765ac7 response_code = 200 uri = /v1/images?project=demo-project
338702025-03-07T23:12:56.935ZINFOtest_unauthorized (external client test context): client received response status = 200
338712025-03-07T23:12:56.935ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images?project=demo-project
338722025-03-07T23:12:56.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
338732025-03-07T23:12:56.936ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 uri = /v1/images?project=demo-project
338742025-03-07T23:12:56.936ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 uri = /v1/images?project=demo-project
338752025-03-07T23:12:56.936ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images?project=demo-project
338762025-03-07T23:12:56.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338772025-03-07T23:12:56.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338782025-03-07T23:12:56.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338792025-03-07T23:12:56.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338802025-03-07T23:12:56.941ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338812025-03-07T23:12:56.941ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338822025-03-07T23:12:56.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
338832025-03-07T23:12:56.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
338842025-03-07T23:12:56.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338852025-03-07T23:12:56.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338862025-03-07T23:12:56.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338872025-03-07T23:12:56.952ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
338882025-03-07T23:12:56.952ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338892025-03-07T23:12:56.952ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338902025-03-07T23:12:56.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338912025-03-07T23:12:56.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
338922025-03-07T23:12:56.964ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
338932025-03-07T23:12:56.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338942025-03-07T23:12:56.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
338952025-03-07T23:12:56.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
338962025-03-07T23:12:56.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
338972025-03-07T23:12:56.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
338982025-03-07T23:12:56.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
338992025-03-07T23:12:56.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339002025-03-07T23:12:56.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339012025-03-07T23:12:56.978ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
339022025-03-07T23:12:56.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339032025-03-07T23:12:56.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339042025-03-07T23:12:56.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339052025-03-07T23:12:56.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
339062025-03-07T23:12:56.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
339072025-03-07T23:12:56.984ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 uri = /v1/images?project=demo-project
339082025-03-07T23:12:56.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database uri = /v1/images?project=demo-project
339092025-03-07T23:12:56.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339102025-03-07T23:12:56.985ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
339112025-03-07T23:12:56.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database uri = /v1/images?project=demo-project
339122025-03-07T23:12:56.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339132025-03-07T23:12:56.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
339142025-03-07T23:12:56.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
339152025-03-07T23:12:56.995ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
339162025-03-07T23:12:56.995ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database uri = /v1/images?project=demo-project
339172025-03-07T23:12:56.995ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339182025-03-07T23:12:56.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
339192025-03-07T23:12:56.999ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
339202025-03-07T23:12:56.999ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database uri = /v1/images?project=demo-project
339212025-03-07T23:12:57.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339222025-03-07T23:12:57.003ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
339232025-03-07T23:12:57.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
339242025-03-07T23:12:57.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database uri = /v1/images?project=demo-project
339252025-03-07T23:12:57.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339262025-03-07T23:12:57.005ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
339272025-03-07T23:12:57.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
339282025-03-07T23:12:57.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/images?project=demo-project
339292025-03-07T23:12:57.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 110506 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fadab1b9-742b-4e9e-84ed-99c6434d3307 response_code = 404 uri = /v1/images?project=demo-project
339302025-03-07T23:12:57.047ZINFOtest_unauthorized (external client test context): client received response status = 404
339312025-03-07T23:12:57.047ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images?project=demo-project
339322025-03-07T23:12:57.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
339332025-03-07T23:12:57.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a1916049-35e5-4bd4-b937-e3a3c1c2d6be uri = /v1/images?project=demo-project
339342025-03-07T23:12:57.047ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a1916049-35e5-4bd4-b937-e3a3c1c2d6be uri = /v1/images?project=demo-project
339352025-03-07T23:12:57.047ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a1916049-35e5-4bd4-b937-e3a3c1c2d6be uri = /v1/images?project=demo-project
339362025-03-07T23:12:57.047ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a1916049-35e5-4bd4-b937-e3a3c1c2d6be uri = /v1/images?project=demo-project
339372025-03-07T23:12:57.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 308 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a1916049-35e5-4bd4-b937-e3a3c1c2d6be response_code = 401 uri = /v1/images?project=demo-project
339382025-03-07T23:12:57.047ZINFOtest_unauthorized (external client test context): client received response status = 401
339392025-03-07T23:12:57.047ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images?project=demo-project
339402025-03-07T23:12:57.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
339412025-03-07T23:12:57.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c040b2ee-396d-40ad-86f8-0ab33593bbd4 uri = /v1/images?project=demo-project
339422025-03-07T23:12:57.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c040b2ee-396d-40ad-86f8-0ab33593bbd4 uri = /v1/images?project=demo-project
339432025-03-07T23:12:57.048ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c040b2ee-396d-40ad-86f8-0ab33593bbd4 uri = /v1/images?project=demo-project
339442025-03-07T23:12:57.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 317 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = c040b2ee-396d-40ad-86f8-0ab33593bbd4 response_code = 401 uri = /v1/images?project=demo-project
339452025-03-07T23:12:57.048ZINFOtest_unauthorized (external client test context): client received response status = 401
339462025-03-07T23:12:57.048ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images?project=demo-project
339472025-03-07T23:12:57.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
339482025-03-07T23:12:57.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 909be1d0-ce2f-46f2-8633-1077b0f3fb77 uri = /v1/images?project=demo-project
339492025-03-07T23:12:57.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 909be1d0-ce2f-46f2-8633-1077b0f3fb77 uri = /v1/images?project=demo-project
339502025-03-07T23:12:57.049ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4297:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4332:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 909be1d0-ce2f-46f2-8633-1077b0f3fb77 uri = /v1/images?project=demo-project
339512025-03-07T23:12:57.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 785 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 909be1d0-ce2f-46f2-8633-1077b0f3fb77 response_code = 401 uri = /v1/images?project=demo-project
339522025-03-07T23:12:57.050ZINFOtest_unauthorized (external client test context): client received response status = 401
339532025-03-07T23:12:57.050ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images?project=demo-project
339542025-03-07T23:12:57.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images?project=demo-project
339552025-03-07T23:12:57.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1825cdf1-87c1-48cb-90ff-6af9e020abc4 uri = /v1/images?project=demo-project
339562025-03-07T23:12:57.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 1825cdf1-87c1-48cb-90ff-6af9e020abc4 response_code = 405 uri = /v1/images?project=demo-project
339572025-03-07T23:12:57.051ZINFOtest_unauthorized (external client test context): client received response status = 405
339582025-03-07T23:12:57.051ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images?project=demo-project
339592025-03-07T23:12:57.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images?project=demo-project
339602025-03-07T23:12:57.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3dcb7762-2fca-495e-bae5-8b82711810b7 uri = /v1/images?project=demo-project
339612025-03-07T23:12:57.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3dcb7762-2fca-495e-bae5-8b82711810b7 response_code = 405 uri = /v1/images?project=demo-project
339622025-03-07T23:12:57.051ZINFOtest_unauthorized (external client test context): client received response status = 405
339632025-03-07T23:12:57.051ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images?project=demo-project
339642025-03-07T23:12:57.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images?project=demo-project
339652025-03-07T23:12:57.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 19fc5212-9dd5-4294-9b44-d3431021fc3f uri = /v1/images?project=demo-project
339662025-03-07T23:12:57.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 19fc5212-9dd5-4294-9b44-d3431021fc3f response_code = 405 uri = /v1/images?project=demo-project
339672025-03-07T23:12:57.052ZINFOtest_unauthorized (external client test context): client received response status = 405
339682025-03-07T23:12:57.053ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images?project=demo-project
339692025-03-07T23:12:57.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images?project=demo-project
339702025-03-07T23:12:57.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 91a74778-b773-47e5-934f-3b7a9052c815 uri = /v1/images?project=demo-project
339712025-03-07T23:12:57.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 91a74778-b773-47e5-934f-3b7a9052c815 response_code = 405 uri = /v1/images?project=demo-project
339722025-03-07T23:12:57.053ZINFOtest_unauthorized (external client test context): client received response status = 405
339732025-03-07T23:12:57.053ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images?project=demo-project
339742025-03-07T23:12:57.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images?project=demo-project
339752025-03-07T23:12:57.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 uri = /v1/images?project=demo-project
339762025-03-07T23:12:57.053ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 uri = /v1/images?project=demo-project
339772025-03-07T23:12:57.053ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images?project=demo-project
339782025-03-07T23:12:57.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339792025-03-07T23:12:57.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339802025-03-07T23:12:57.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339812025-03-07T23:12:57.057ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339822025-03-07T23:12:57.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339832025-03-07T23:12:57.058ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339842025-03-07T23:12:57.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
339852025-03-07T23:12:57.060ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
339862025-03-07T23:12:57.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339872025-03-07T23:12:57.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339882025-03-07T23:12:57.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339892025-03-07T23:12:57.065ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
339902025-03-07T23:12:57.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339912025-03-07T23:12:57.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339922025-03-07T23:12:57.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339932025-03-07T23:12:57.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
339942025-03-07T23:12:57.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
339952025-03-07T23:12:57.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339962025-03-07T23:12:57.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339972025-03-07T23:12:57.074ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339982025-03-07T23:12:57.075ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
339992025-03-07T23:12:57.076ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
340002025-03-07T23:12:57.076ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
340012025-03-07T23:12:57.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
340022025-03-07T23:12:57.077ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
340032025-03-07T23:12:57.078ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
340042025-03-07T23:12:57.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
340052025-03-07T23:12:57.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
340062025-03-07T23:12:57.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
340072025-03-07T23:12:57.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
340082025-03-07T23:12:57.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
340092025-03-07T23:12:57.086ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 uri = /v1/images?project=demo-project
340102025-03-07T23:12:57.086ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database uri = /v1/images?project=demo-project
340112025-03-07T23:12:57.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340122025-03-07T23:12:57.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
340132025-03-07T23:12:57.096ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database uri = /v1/images?project=demo-project
340142025-03-07T23:12:57.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340152025-03-07T23:12:57.100ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
340162025-03-07T23:12:57.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
340172025-03-07T23:12:57.104ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
340182025-03-07T23:12:57.105ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database uri = /v1/images?project=demo-project
340192025-03-07T23:12:57.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340202025-03-07T23:12:57.106ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
340212025-03-07T23:12:57.117ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
340222025-03-07T23:12:57.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database uri = /v1/images?project=demo-project
340232025-03-07T23:12:57.117ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340242025-03-07T23:12:57.118ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
340252025-03-07T23:12:57.121ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
340262025-03-07T23:12:57.122ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database uri = /v1/images?project=demo-project
340272025-03-07T23:12:57.122ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340282025-03-07T23:12:57.122ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
340292025-03-07T23:12:57.129ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
340302025-03-07T23:12:57.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/images?project=demo-project
340312025-03-07T23:12:57.161ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 107974 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = db83567f-1b98-481d-9639-1dd71fc373d1 response_code = 404 uri = /v1/images?project=demo-project
340322025-03-07T23:12:57.161ZINFOtest_unauthorized (external client test context): client received response status = 404
340332025-03-07T23:12:57.161ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images?project=demo-project
340342025-03-07T23:12:57.161ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images?project=demo-project
340352025-03-07T23:12:57.162ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73bb5787-6999-4167-83a2-93a3becbbc72 uri = /v1/images?project=demo-project
340362025-03-07T23:12:57.162ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73bb5787-6999-4167-83a2-93a3becbbc72 uri = /v1/images?project=demo-project
340372025-03-07T23:12:57.162ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73bb5787-6999-4167-83a2-93a3becbbc72 uri = /v1/images?project=demo-project
340382025-03-07T23:12:57.162ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73bb5787-6999-4167-83a2-93a3becbbc72 uri = /v1/images?project=demo-project
340392025-03-07T23:12:57.162ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 459 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 73bb5787-6999-4167-83a2-93a3becbbc72 response_code = 401 uri = /v1/images?project=demo-project
340402025-03-07T23:12:57.163ZINFOtest_unauthorized (external client test context): client received response status = 401
340412025-03-07T23:12:57.163ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images?project=demo-project
340422025-03-07T23:12:57.163ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images?project=demo-project
340432025-03-07T23:12:57.163ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a857ccc2-ec43-462a-b78b-4e50371912bb uri = /v1/images?project=demo-project
340442025-03-07T23:12:57.163ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a857ccc2-ec43-462a-b78b-4e50371912bb uri = /v1/images?project=demo-project
340452025-03-07T23:12:57.163ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a857ccc2-ec43-462a-b78b-4e50371912bb uri = /v1/images?project=demo-project
340462025-03-07T23:12:57.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 278 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a857ccc2-ec43-462a-b78b-4e50371912bb response_code = 401 uri = /v1/images?project=demo-project
340472025-03-07T23:12:57.164ZINFOtest_unauthorized (external client test context): client received response status = 401
340482025-03-07T23:12:57.164ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images?project=demo-project
340492025-03-07T23:12:57.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images?project=demo-project
340502025-03-07T23:12:57.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 590f8624-e6cb-4113-9001-4ef6c694deac uri = /v1/images?project=demo-project
340512025-03-07T23:12:57.164ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 590f8624-e6cb-4113-9001-4ef6c694deac uri = /v1/images?project=demo-project
340522025-03-07T23:12:57.166ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4343:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4368:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 590f8624-e6cb-4113-9001-4ef6c694deac uri = /v1/images?project=demo-project
340532025-03-07T23:12:57.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 991 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 590f8624-e6cb-4113-9001-4ef6c694deac response_code = 401 uri = /v1/images?project=demo-project
340542025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client received response status = 401
340552025-03-07T23:12:57.167ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images?project=demo-project
340562025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340572025-03-07T23:12:57.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a461fdb7-417e-4f91-8c8d-d3e1680d74e1 uri = /v1/images?project=demo-project
340582025-03-07T23:12:57.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a461fdb7-417e-4f91-8c8d-d3e1680d74e1 response_code = 405 uri = /v1/images?project=demo-project
340592025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client received response status = 405
340602025-03-07T23:12:57.167ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images?project=demo-project
340612025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340622025-03-07T23:12:57.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c4596a2e-9197-41ba-8ded-646c3e77a9c2 uri = /v1/images?project=demo-project
340632025-03-07T23:12:57.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c4596a2e-9197-41ba-8ded-646c3e77a9c2 response_code = 405 uri = /v1/images?project=demo-project
340642025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client received response status = 405
340652025-03-07T23:12:57.167ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images?project=demo-project
340662025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340672025-03-07T23:12:57.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b827cb34-615c-46e9-8f23-1c8af49d03db uri = /v1/images?project=demo-project
340682025-03-07T23:12:57.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b827cb34-615c-46e9-8f23-1c8af49d03db response_code = 405 uri = /v1/images?project=demo-project
340692025-03-07T23:12:57.167ZINFOtest_unauthorized (external client test context): client received response status = 405
340702025-03-07T23:12:57.167ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images?project=demo-project
340712025-03-07T23:12:57.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340722025-03-07T23:12:57.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 738343e8-f967-4384-a3f1-3175d792d2ee uri = /v1/images?project=demo-project
340732025-03-07T23:12:57.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 738343e8-f967-4384-a3f1-3175d792d2ee response_code = 405 uri = /v1/images?project=demo-project
340742025-03-07T23:12:57.168ZINFOtest_unauthorized (external client test context): client received response status = 405
340752025-03-07T23:12:57.168ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images?project=demo-project
340762025-03-07T23:12:57.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340772025-03-07T23:12:57.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e71a9ac-5b5f-4726-93c4-cfc65a6d1b3d uri = /v1/images?project=demo-project
340782025-03-07T23:12:57.171ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8e71a9ac-5b5f-4726-93c4-cfc65a6d1b3d response_code = 405 uri = /v1/images?project=demo-project
340792025-03-07T23:12:57.176ZINFOtest_unauthorized (external client test context): client received response status = 405
340802025-03-07T23:12:57.177ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images?project=demo-project
340812025-03-07T23:12:57.177ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340822025-03-07T23:12:57.178ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8233d09a-7000-4dfb-90aa-6133ced517eb uri = /v1/images?project=demo-project
340832025-03-07T23:12:57.178ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 8233d09a-7000-4dfb-90aa-6133ced517eb response_code = 405 uri = /v1/images?project=demo-project
340842025-03-07T23:12:57.178ZINFOtest_unauthorized (external client test context): client received response status = 405
340852025-03-07T23:12:57.178ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images?project=demo-project
340862025-03-07T23:12:57.178ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340872025-03-07T23:12:57.178ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 82f2ce4a-121c-4608-ab1d-d0f48d93f051 uri = /v1/images?project=demo-project
340882025-03-07T23:12:57.178ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 82f2ce4a-121c-4608-ab1d-d0f48d93f051 response_code = 405 uri = /v1/images?project=demo-project
340892025-03-07T23:12:57.178ZINFOtest_unauthorized (external client test context): client received response status = 405
340902025-03-07T23:12:57.178ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images?project=demo-project
340912025-03-07T23:12:57.178ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images?project=demo-project
340922025-03-07T23:12:57.178ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96438b77-0ac1-4d25-8026-987cff33ddf7 uri = /v1/images?project=demo-project
340932025-03-07T23:12:57.180ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96438b77-0ac1-4d25-8026-987cff33ddf7 response_code = 405 uri = /v1/images?project=demo-project
340942025-03-07T23:12:57.180ZINFOtest_unauthorized (external client test context): client received response status = 405
340952025-03-07T23:12:57.180ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images?project=demo-project
340962025-03-07T23:12:57.180ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images?project=demo-project
340972025-03-07T23:12:57.180ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 uri = /v1/images?project=demo-project
340982025-03-07T23:12:57.180ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 uri = /v1/images?project=demo-project
340992025-03-07T23:12:57.180ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
341002025-03-07T23:12:57.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341012025-03-07T23:12:57.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341022025-03-07T23:12:57.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341032025-03-07T23:12:57.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341042025-03-07T23:12:57.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341052025-03-07T23:12:57.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341062025-03-07T23:12:57.186ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
341072025-03-07T23:12:57.186ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
341082025-03-07T23:12:57.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341092025-03-07T23:12:57.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341102025-03-07T23:12:57.187ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341112025-03-07T23:12:57.189ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
341122025-03-07T23:12:57.189ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341132025-03-07T23:12:57.189ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341142025-03-07T23:12:57.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341152025-03-07T23:12:57.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
341162025-03-07T23:12:57.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
341172025-03-07T23:12:57.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341182025-03-07T23:12:57.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341192025-03-07T23:12:57.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341202025-03-07T23:12:57.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
341212025-03-07T23:12:57.197ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
341222025-03-07T23:12:57.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341232025-03-07T23:12:57.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341242025-03-07T23:12:57.198ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341252025-03-07T23:12:57.199ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
341262025-03-07T23:12:57.199ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341272025-03-07T23:12:57.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341282025-03-07T23:12:57.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341292025-03-07T23:12:57.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
341302025-03-07T23:12:57.208ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
341312025-03-07T23:12:57.208ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 uri = /v1/images?project=demo-project
341322025-03-07T23:12:57.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341332025-03-07T23:12:57.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341342025-03-07T23:12:57.210ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341352025-03-07T23:12:57.211ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341362025-03-07T23:12:57.212ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341372025-03-07T23:12:57.212ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341382025-03-07T23:12:57.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
341392025-03-07T23:12:57.215ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
341402025-03-07T23:12:57.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341412025-03-07T23:12:57.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341422025-03-07T23:12:57.215ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341432025-03-07T23:12:57.218ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
341442025-03-07T23:12:57.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341452025-03-07T23:12:57.221ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341462025-03-07T23:12:57.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341472025-03-07T23:12:57.230ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
341482025-03-07T23:12:57.231ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
341492025-03-07T23:12:57.231ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
341502025-03-07T23:12:57.231ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
341512025-03-07T23:12:57.231ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
341522025-03-07T23:12:57.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341532025-03-07T23:12:57.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341542025-03-07T23:12:57.244ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341552025-03-07T23:12:57.246ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
341562025-03-07T23:12:57.246ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
341572025-03-07T23:12:57.246ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
341582025-03-07T23:12:57.248ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
341592025-03-07T23:12:57.248ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
341602025-03-07T23:12:57.248ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images?project=demo-project
341612025-03-07T23:12:57.248ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341622025-03-07T23:12:57.250ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341632025-03-07T23:12:57.250ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341642025-03-07T23:12:57.251ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
341652025-03-07T23:12:57.251ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
341662025-03-07T23:12:57.251ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
341672025-03-07T23:12:57.253ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341682025-03-07T23:12:57.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341692025-03-07T23:12:57.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341702025-03-07T23:12:57.257ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
341712025-03-07T23:12:57.257ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341722025-03-07T23:12:57.257ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341732025-03-07T23:12:57.257ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341742025-03-07T23:12:57.261ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
341752025-03-07T23:12:57.268ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
341762025-03-07T23:12:57.269ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database uri = /v1/images?project=demo-project
341772025-03-07T23:12:57.269ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
341782025-03-07T23:12:57.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
341792025-03-07T23:12:57.272ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 93407 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = ca617cfd-4ab9-4d00-b947-8dd995d91400 response_code = 200 uri = /v1/images?project=demo-project
341802025-03-07T23:12:57.275ZINFOtest_unauthorized (external client test context): client received response status = 200
341812025-03-07T23:12:57.280ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image?project=demo-project
341822025-03-07T23:12:57.280ZINFOtest_unauthorized: test: privileged GET url = /v1/images/demo-image?project=demo-project
341832025-03-07T23:12:57.280ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
341842025-03-07T23:12:57.280ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b uri = /v1/images/demo-image?project=demo-project
341852025-03-07T23:12:57.280ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b uri = /v1/images/demo-image?project=demo-project
341862025-03-07T23:12:57.280ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images/demo-image?project=demo-project
341872025-03-07T23:12:57.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341882025-03-07T23:12:57.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341892025-03-07T23:12:57.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341902025-03-07T23:12:57.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341912025-03-07T23:12:57.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341922025-03-07T23:12:57.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341932025-03-07T23:12:57.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
341942025-03-07T23:12:57.287ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
341952025-03-07T23:12:57.287ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341962025-03-07T23:12:57.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341972025-03-07T23:12:57.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341982025-03-07T23:12:57.290ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
341992025-03-07T23:12:57.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342002025-03-07T23:12:57.291ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342012025-03-07T23:12:57.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342022025-03-07T23:12:57.294ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342032025-03-07T23:12:57.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
342042025-03-07T23:12:57.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342052025-03-07T23:12:57.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342062025-03-07T23:12:57.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342072025-03-07T23:12:57.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
342082025-03-07T23:12:57.301ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
342092025-03-07T23:12:57.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342102025-03-07T23:12:57.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342112025-03-07T23:12:57.302ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342122025-03-07T23:12:57.304ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
342132025-03-07T23:12:57.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342142025-03-07T23:12:57.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342152025-03-07T23:12:57.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342162025-03-07T23:12:57.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342172025-03-07T23:12:57.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
342182025-03-07T23:12:57.309ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b uri = /v1/images/demo-image?project=demo-project
342192025-03-07T23:12:57.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342202025-03-07T23:12:57.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342212025-03-07T23:12:57.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342222025-03-07T23:12:57.312ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342232025-03-07T23:12:57.312ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342242025-03-07T23:12:57.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342252025-03-07T23:12:57.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342262025-03-07T23:12:57.315ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342272025-03-07T23:12:57.316ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342282025-03-07T23:12:57.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
342292025-03-07T23:12:57.319ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images/demo-image?project=demo-project
342302025-03-07T23:12:57.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342312025-03-07T23:12:57.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342322025-03-07T23:12:57.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342332025-03-07T23:12:57.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
342342025-03-07T23:12:57.322ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
342352025-03-07T23:12:57.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342362025-03-07T23:12:57.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342372025-03-07T23:12:57.323ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342382025-03-07T23:12:57.325ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
342392025-03-07T23:12:57.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database uri = /v1/images/demo-image?project=demo-project
342402025-03-07T23:12:57.326ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342412025-03-07T23:12:57.326ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342422025-03-07T23:12:57.332ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images/demo-image?project=demo-project
342432025-03-07T23:12:57.344ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342442025-03-07T23:12:57.346ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 69097 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a29a8e38-9e4d-4789-9827-781a478f419b response_code = 200 uri = /v1/images/demo-image?project=demo-project
342452025-03-07T23:12:57.346ZINFOtest_unauthorized (external client test context): client received response status = 200
342462025-03-07T23:12:57.346ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image?project=demo-project
342472025-03-07T23:12:57.346ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
342482025-03-07T23:12:57.346ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 uri = /v1/images/demo-image?project=demo-project
342492025-03-07T23:12:57.346ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 uri = /v1/images/demo-image?project=demo-project
342502025-03-07T23:12:57.347ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image?project=demo-project
342512025-03-07T23:12:57.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342522025-03-07T23:12:57.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342532025-03-07T23:12:57.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342542025-03-07T23:12:57.349ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342552025-03-07T23:12:57.350ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342562025-03-07T23:12:57.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342572025-03-07T23:12:57.362ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
342582025-03-07T23:12:57.364ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
342592025-03-07T23:12:57.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342602025-03-07T23:12:57.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342612025-03-07T23:12:57.365ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342622025-03-07T23:12:57.369ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
342632025-03-07T23:12:57.369ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342642025-03-07T23:12:57.369ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342652025-03-07T23:12:57.370ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342662025-03-07T23:12:57.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342672025-03-07T23:12:57.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
342682025-03-07T23:12:57.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342692025-03-07T23:12:57.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342702025-03-07T23:12:57.390ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342712025-03-07T23:12:57.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
342722025-03-07T23:12:57.392ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
342732025-03-07T23:12:57.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342742025-03-07T23:12:57.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342752025-03-07T23:12:57.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342762025-03-07T23:12:57.397ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
342772025-03-07T23:12:57.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342782025-03-07T23:12:57.397ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342792025-03-07T23:12:57.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342802025-03-07T23:12:57.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342812025-03-07T23:12:57.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
342822025-03-07T23:12:57.404ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 uri = /v1/images/demo-image?project=demo-project
342832025-03-07T23:12:57.404ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
342842025-03-07T23:12:57.404ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342852025-03-07T23:12:57.405ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342862025-03-07T23:12:57.407ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
342872025-03-07T23:12:57.407ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342882025-03-07T23:12:57.407ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342892025-03-07T23:12:57.409ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
342902025-03-07T23:12:57.410ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342912025-03-07T23:12:57.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342922025-03-07T23:12:57.413ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
342932025-03-07T23:12:57.414ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images/demo-image?project=demo-project
342942025-03-07T23:12:57.414ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
342952025-03-07T23:12:57.414ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
342962025-03-07T23:12:57.417ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
342972025-03-07T23:12:57.420ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
342982025-03-07T23:12:57.421ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
342992025-03-07T23:12:57.421ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
343002025-03-07T23:12:57.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
343012025-03-07T23:12:57.431ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
343022025-03-07T23:12:57.435ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database uri = /v1/images/demo-image?project=demo-project
343032025-03-07T23:12:57.435ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
343042025-03-07T23:12:57.435ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
343052025-03-07T23:12:57.440ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
343062025-03-07T23:12:57.446ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image?project=demo-project
343072025-03-07T23:12:57.447ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 100462 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 6fd50764-ba21-43a0-85cd-db0cf541f292 response_code = 404 uri = /v1/images/demo-image?project=demo-project
343082025-03-07T23:12:57.447ZINFOtest_unauthorized (external client test context): client received response status = 404
343092025-03-07T23:12:57.447ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image?project=demo-project
343102025-03-07T23:12:57.449ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343112025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398d096e-b7d4-45c2-b766-de7a636a2c04 uri = /v1/images/demo-image?project=demo-project
343122025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398d096e-b7d4-45c2-b766-de7a636a2c04 uri = /v1/images/demo-image?project=demo-project
343132025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398d096e-b7d4-45c2-b766-de7a636a2c04 uri = /v1/images/demo-image?project=demo-project
343142025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398d096e-b7d4-45c2-b766-de7a636a2c04 uri = /v1/images/demo-image?project=demo-project
343152025-03-07T23:12:57.449ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 339 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 398d096e-b7d4-45c2-b766-de7a636a2c04 response_code = 401 uri = /v1/images/demo-image?project=demo-project
343162025-03-07T23:12:57.449ZINFOtest_unauthorized (external client test context): client received response status = 401
343172025-03-07T23:12:57.449ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image?project=demo-project
343182025-03-07T23:12:57.449ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343192025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 06c5cf9c-4d2e-4b04-a8a4-11479a9a6c0e uri = /v1/images/demo-image?project=demo-project
343202025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 06c5cf9c-4d2e-4b04-a8a4-11479a9a6c0e uri = /v1/images/demo-image?project=demo-project
343212025-03-07T23:12:57.449ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 06c5cf9c-4d2e-4b04-a8a4-11479a9a6c0e uri = /v1/images/demo-image?project=demo-project
343222025-03-07T23:12:57.451ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 201 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 06c5cf9c-4d2e-4b04-a8a4-11479a9a6c0e response_code = 401 uri = /v1/images/demo-image?project=demo-project
343232025-03-07T23:12:57.456ZINFOtest_unauthorized (external client test context): client received response status = 401
343242025-03-07T23:12:57.456ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image?project=demo-project
343252025-03-07T23:12:57.456ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343262025-03-07T23:12:57.456ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a6b7f2b-af7e-4713-a4fe-2b01f5564536 uri = /v1/images/demo-image?project=demo-project
343272025-03-07T23:12:57.456ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a6b7f2b-af7e-4713-a4fe-2b01f5564536 uri = /v1/images/demo-image?project=demo-project
343282025-03-07T23:12:57.457ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4379:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4408:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a6b7f2b-af7e-4713-a4fe-2b01f5564536 uri = /v1/images/demo-image?project=demo-project
343292025-03-07T23:12:57.457ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2449 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9a6b7f2b-af7e-4713-a4fe-2b01f5564536 response_code = 401 uri = /v1/images/demo-image?project=demo-project
343302025-03-07T23:12:57.457ZINFOtest_unauthorized (external client test context): client received response status = 401
343312025-03-07T23:12:57.457ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image?project=demo-project
343322025-03-07T23:12:57.457ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343332025-03-07T23:12:57.457ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f50aa8b6-05b9-46bd-8907-5ed09bb7d808 uri = /v1/images/demo-image?project=demo-project
343342025-03-07T23:12:57.459ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 6205 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f50aa8b6-05b9-46bd-8907-5ed09bb7d808 response_code = 405 uri = /v1/images/demo-image?project=demo-project
343352025-03-07T23:12:57.459ZINFOtest_unauthorized (external client test context): client received response status = 405
343362025-03-07T23:12:57.461ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image?project=demo-project
343372025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343382025-03-07T23:12:57.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ff86819a-8aab-469e-a453-348208051fbf uri = /v1/images/demo-image?project=demo-project
343392025-03-07T23:12:57.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ff86819a-8aab-469e-a453-348208051fbf response_code = 405 uri = /v1/images/demo-image?project=demo-project
343402025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client received response status = 405
343412025-03-07T23:12:57.461ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image?project=demo-project
343422025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343432025-03-07T23:12:57.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 49be8771-c479-466e-9877-3bf61d4ac1dd uri = /v1/images/demo-image?project=demo-project
343442025-03-07T23:12:57.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 49be8771-c479-466e-9877-3bf61d4ac1dd response_code = 405 uri = /v1/images/demo-image?project=demo-project
343452025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client received response status = 405
343462025-03-07T23:12:57.461ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image?project=demo-project
343472025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343482025-03-07T23:12:57.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b422c971-48c5-48c3-accd-1c8b6c9c7fbb uri = /v1/images/demo-image?project=demo-project
343492025-03-07T23:12:57.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b422c971-48c5-48c3-accd-1c8b6c9c7fbb response_code = 405 uri = /v1/images/demo-image?project=demo-project
343502025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client received response status = 405
343512025-03-07T23:12:57.461ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image?project=demo-project
343522025-03-07T23:12:57.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343532025-03-07T23:12:57.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9da70ba2-e5f5-4238-9b8e-3e7ed9242751 uri = /v1/images/demo-image?project=demo-project
343542025-03-07T23:12:57.463ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9da70ba2-e5f5-4238-9b8e-3e7ed9242751 response_code = 405 uri = /v1/images/demo-image?project=demo-project
343552025-03-07T23:12:57.463ZINFOtest_unauthorized (external client test context): client received response status = 405
343562025-03-07T23:12:57.463ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image?project=demo-project
343572025-03-07T23:12:57.463ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343582025-03-07T23:12:57.463ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 53df1405-dc14-4f0b-b4b4-bcccbdf4e2e4 uri = /v1/images/demo-image?project=demo-project
343592025-03-07T23:12:57.464ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 53df1405-dc14-4f0b-b4b4-bcccbdf4e2e4 response_code = 405 uri = /v1/images/demo-image?project=demo-project
343602025-03-07T23:12:57.464ZINFOtest_unauthorized (external client test context): client received response status = 405
343612025-03-07T23:12:57.464ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image?project=demo-project
343622025-03-07T23:12:57.464ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343632025-03-07T23:12:57.464ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 430feaae-b9eb-4554-9cbd-931d8986e34c uri = /v1/images/demo-image?project=demo-project
343642025-03-07T23:12:57.464ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 430feaae-b9eb-4554-9cbd-931d8986e34c response_code = 405 uri = /v1/images/demo-image?project=demo-project
343652025-03-07T23:12:57.464ZINFOtest_unauthorized (external client test context): client received response status = 405
343662025-03-07T23:12:57.464ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image?project=demo-project
343672025-03-07T23:12:57.465ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343682025-03-07T23:12:57.465ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e4c4dd85-39a3-46b2-bd24-0191d1f1423f uri = /v1/images/demo-image?project=demo-project
343692025-03-07T23:12:57.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = e4c4dd85-39a3-46b2-bd24-0191d1f1423f response_code = 405 uri = /v1/images/demo-image?project=demo-project
343702025-03-07T23:12:57.466ZINFOtest_unauthorized (external client test context): client received response status = 405
343712025-03-07T23:12:57.466ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image?project=demo-project
343722025-03-07T23:12:57.466ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
343732025-03-07T23:12:57.466ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 uri = /v1/images/demo-image?project=demo-project
343742025-03-07T23:12:57.466ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 uri = /v1/images/demo-image?project=demo-project
343752025-03-07T23:12:57.466ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image?project=demo-project
343762025-03-07T23:12:57.466ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343772025-03-07T23:12:57.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343782025-03-07T23:12:57.466ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343792025-03-07T23:12:57.466ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343802025-03-07T23:12:57.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343812025-03-07T23:12:57.467ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343822025-03-07T23:12:57.469ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
343832025-03-07T23:12:57.469ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
343842025-03-07T23:12:57.469ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343852025-03-07T23:12:57.469ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343862025-03-07T23:12:57.469ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343872025-03-07T23:12:57.471ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
343882025-03-07T23:12:57.471ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343892025-03-07T23:12:57.471ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343902025-03-07T23:12:57.472ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343912025-03-07T23:12:57.474ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
343922025-03-07T23:12:57.478ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
343932025-03-07T23:12:57.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343942025-03-07T23:12:57.478ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343952025-03-07T23:12:57.479ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343962025-03-07T23:12:57.481ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
343972025-03-07T23:12:57.482ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
343982025-03-07T23:12:57.482ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343992025-03-07T23:12:57.482ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344002025-03-07T23:12:57.483ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344012025-03-07T23:12:57.484ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
344022025-03-07T23:12:57.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344032025-03-07T23:12:57.485ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344042025-03-07T23:12:57.485ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344052025-03-07T23:12:57.488ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
344062025-03-07T23:12:57.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
344072025-03-07T23:12:57.492ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 uri = /v1/images/demo-image?project=demo-project
344082025-03-07T23:12:57.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344092025-03-07T23:12:57.492ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344102025-03-07T23:12:57.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344112025-03-07T23:12:57.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344122025-03-07T23:12:57.503ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344132025-03-07T23:12:57.504ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344142025-03-07T23:12:57.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344152025-03-07T23:12:57.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344162025-03-07T23:12:57.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344172025-03-07T23:12:57.527ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
344182025-03-07T23:12:57.527ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images/demo-image?project=demo-project
344192025-03-07T23:12:57.528ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344202025-03-07T23:12:57.528ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344212025-03-07T23:12:57.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344222025-03-07T23:12:57.535ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
344232025-03-07T23:12:57.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344242025-03-07T23:12:57.540ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344252025-03-07T23:12:57.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344262025-03-07T23:12:57.541ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
344272025-03-07T23:12:57.542ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database uri = /v1/images/demo-image?project=demo-project
344282025-03-07T23:12:57.542ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344292025-03-07T23:12:57.543ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
344302025-03-07T23:12:57.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
344312025-03-07T23:12:57.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image?project=demo-project
344322025-03-07T23:12:57.571ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 107176 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a24bea22-1c48-4985-84bb-df1d90d3bb33 response_code = 404 uri = /v1/images/demo-image?project=demo-project
344332025-03-07T23:12:57.571ZINFOtest_unauthorized (external client test context): client received response status = 404
344342025-03-07T23:12:57.572ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image?project=demo-project
344352025-03-07T23:12:57.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344362025-03-07T23:12:57.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eed8748d-a11b-469e-abc4-f7bd57ede56d uri = /v1/images/demo-image?project=demo-project
344372025-03-07T23:12:57.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
344382025-03-07T23:12:57.573ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eed8748d-a11b-469e-abc4-f7bd57ede56d uri = /v1/images/demo-image?project=demo-project
344392025-03-07T23:12:57.573ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eed8748d-a11b-469e-abc4-f7bd57ede56d uri = /v1/images/demo-image?project=demo-project
344402025-03-07T23:12:57.573ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eed8748d-a11b-469e-abc4-f7bd57ede56d uri = /v1/images/demo-image?project=demo-project
344412025-03-07T23:12:57.573ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1015 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = eed8748d-a11b-469e-abc4-f7bd57ede56d response_code = 401 uri = /v1/images/demo-image?project=demo-project
344422025-03-07T23:12:57.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344432025-03-07T23:12:57.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 646a17aa-c170-438e-8248-d5da6d29587c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344442025-03-07T23:12:57.574ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 646a17aa-c170-438e-8248-d5da6d29587c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344452025-03-07T23:12:57.575ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 646a17aa-c170-438e-8248-d5da6d29587c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344462025-03-07T23:12:57.576ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 646a17aa-c170-438e-8248-d5da6d29587c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344472025-03-07T23:12:57.576ZINFOtest_unauthorized (external client test context): client received response status = 401
344482025-03-07T23:12:57.576ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image?project=demo-project
344492025-03-07T23:12:57.576ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344502025-03-07T23:12:57.577ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abdd1e19-3d61-4d4b-8a7b-d7a0a20f68cf uri = /v1/images/demo-image?project=demo-project
344512025-03-07T23:12:57.577ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abdd1e19-3d61-4d4b-8a7b-d7a0a20f68cf uri = /v1/images/demo-image?project=demo-project
344522025-03-07T23:12:57.577ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abdd1e19-3d61-4d4b-8a7b-d7a0a20f68cf uri = /v1/images/demo-image?project=demo-project
344532025-03-07T23:12:57.577ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 662 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = abdd1e19-3d61-4d4b-8a7b-d7a0a20f68cf response_code = 401 uri = /v1/images/demo-image?project=demo-project
344542025-03-07T23:12:57.578ZINFOtest_unauthorized (external client test context): client received response status = 401
344552025-03-07T23:12:57.578ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image?project=demo-project
344562025-03-07T23:12:57.578ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344572025-03-07T23:12:57.579ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 249a3cc5-5f4b-4e7f-ac86-64d18925e6f4 uri = /v1/images/demo-image?project=demo-project
344582025-03-07T23:12:57.579ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 249a3cc5-5f4b-4e7f-ac86-64d18925e6f4 uri = /v1/images/demo-image?project=demo-project
344592025-03-07T23:12:57.581ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4419:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4439:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 249a3cc5-5f4b-4e7f-ac86-64d18925e6f4 uri = /v1/images/demo-image?project=demo-project
344602025-03-07T23:12:57.583ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3177 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 249a3cc5-5f4b-4e7f-ac86-64d18925e6f4 response_code = 401 uri = /v1/images/demo-image?project=demo-project
344612025-03-07T23:12:57.584ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7808 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 646a17aa-c170-438e-8248-d5da6d29587c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
344622025-03-07T23:12:57.584ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "646a17aa-c170-438e-8248-d5da6d29587c", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:57 GMT"} })
344632025-03-07T23:12:57.584ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344642025-03-07T23:12:57.584ZINFOtest_unauthorized (external client test context): client received response status = 401
344652025-03-07T23:12:57.584ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image?project=demo-project
344662025-03-07T23:12:57.584ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344672025-03-07T23:12:57.584ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 390ab25f-8e05-4ecc-bae8-83d63cdd9c16 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344682025-03-07T23:12:57.586ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 390ab25f-8e05-4ecc-bae8-83d63cdd9c16 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344692025-03-07T23:12:57.588ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 390ab25f-8e05-4ecc-bae8-83d63cdd9c16 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344702025-03-07T23:12:57.589ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 390ab25f-8e05-4ecc-bae8-83d63cdd9c16 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344712025-03-07T23:12:57.590ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3132e39e-c696-40a3-b319-8c1eeecf67e2 uri = /v1/images/demo-image?project=demo-project
344722025-03-07T23:12:57.590ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 123 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3132e39e-c696-40a3-b319-8c1eeecf67e2 response_code = 405 uri = /v1/images/demo-image?project=demo-project
344732025-03-07T23:12:57.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344742025-03-07T23:12:57.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344752025-03-07T23:12:57.592ZINFOtest_unauthorized (external client test context): client received response status = 405
344762025-03-07T23:12:57.593ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image?project=demo-project
344772025-03-07T23:12:57.593ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344782025-03-07T23:12:57.594ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344792025-03-07T23:12:57.595ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344802025-03-07T23:12:57.595ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344812025-03-07T23:12:57.596ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344822025-03-07T23:12:57.596ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11885 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 390ab25f-8e05-4ecc-bae8-83d63cdd9c16 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
344832025-03-07T23:12:57.596ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9f66be00-fde6-4cd3-82ba-a30cd30b345a uri = /v1/images/demo-image?project=demo-project
344842025-03-07T23:12:57.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 80 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9f66be00-fde6-4cd3-82ba-a30cd30b345a response_code = 405 uri = /v1/images/demo-image?project=demo-project
344852025-03-07T23:12:57.596ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "390ab25f-8e05-4ecc-bae8-83d63cdd9c16", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:57 GMT"} })
344862025-03-07T23:12:57.596ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
344872025-03-07T23:12:57.596ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
344882025-03-07T23:12:57.596ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
344892025-03-07T23:12:57.597ZINFOtest_unauthorized (external client test context): client received response status = 405
344902025-03-07T23:12:57.598ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image?project=demo-project
344912025-03-07T23:12:57.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344922025-03-07T23:12:57.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f0aec55f-2aa3-4734-beed-0d841d11a721 uri = /v1/images/demo-image?project=demo-project
344932025-03-07T23:12:57.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f0aec55f-2aa3-4734-beed-0d841d11a721 response_code = 405 uri = /v1/images/demo-image?project=demo-project
344942025-03-07T23:12:57.599ZINFOtest_unauthorized (external client test context): client received response status = 405
344952025-03-07T23:12:57.599ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image?project=demo-project
344962025-03-07T23:12:57.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
344972025-03-07T23:12:57.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7682c362-4cee-4716-9e47-330c3a0b5328 uri = /v1/images/demo-image?project=demo-project
344982025-03-07T23:12:57.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7682c362-4cee-4716-9e47-330c3a0b5328 response_code = 405 uri = /v1/images/demo-image?project=demo-project
344992025-03-07T23:12:57.599ZINFOtest_unauthorized (external client test context): client received response status = 405
345002025-03-07T23:12:57.599ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image?project=demo-project
345012025-03-07T23:12:57.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image?project=demo-project
345022025-03-07T23:12:57.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 uri = /v1/images/demo-image?project=demo-project
345032025-03-07T23:12:57.601ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 uri = /v1/images/demo-image?project=demo-project
345042025-03-07T23:12:57.601ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images/demo-image?project=demo-project
345052025-03-07T23:12:57.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345062025-03-07T23:12:57.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345072025-03-07T23:12:57.601ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345082025-03-07T23:12:57.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345092025-03-07T23:12:57.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345102025-03-07T23:12:57.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345112025-03-07T23:12:57.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
345122025-03-07T23:12:57.609ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
345132025-03-07T23:12:57.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345142025-03-07T23:12:57.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345152025-03-07T23:12:57.609ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345162025-03-07T23:12:57.610ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
345172025-03-07T23:12:57.610ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345182025-03-07T23:12:57.611ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345192025-03-07T23:12:57.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345202025-03-07T23:12:57.612ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
345212025-03-07T23:12:57.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
345222025-03-07T23:12:57.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345232025-03-07T23:12:57.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345242025-03-07T23:12:57.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345252025-03-07T23:12:57.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
345262025-03-07T23:12:57.621ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
345272025-03-07T23:12:57.621ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345282025-03-07T23:12:57.621ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345292025-03-07T23:12:57.622ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345302025-03-07T23:12:57.625ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
345312025-03-07T23:12:57.625ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345322025-03-07T23:12:57.625ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345332025-03-07T23:12:57.625ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345342025-03-07T23:12:57.636ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
345352025-03-07T23:12:57.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
345362025-03-07T23:12:57.642ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 uri = /v1/images/demo-image?project=demo-project
345372025-03-07T23:12:57.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345382025-03-07T23:12:57.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345392025-03-07T23:12:57.643ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345402025-03-07T23:12:57.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345412025-03-07T23:12:57.646ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345422025-03-07T23:12:57.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345432025-03-07T23:12:57.650ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345442025-03-07T23:12:57.650ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345452025-03-07T23:12:57.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345462025-03-07T23:12:57.666ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
345472025-03-07T23:12:57.666ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images/demo-image?project=demo-project
345482025-03-07T23:12:57.666ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345492025-03-07T23:12:57.666ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345502025-03-07T23:12:57.674ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345512025-03-07T23:12:57.678ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
345522025-03-07T23:12:57.678ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345532025-03-07T23:12:57.679ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345542025-03-07T23:12:57.680ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345552025-03-07T23:12:57.691ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
345562025-03-07T23:12:57.691ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database uri = /v1/images/demo-image?project=demo-project
345572025-03-07T23:12:57.692ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
345582025-03-07T23:12:57.693ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345592025-03-07T23:12:57.697ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images/demo-image?project=demo-project
345602025-03-07T23:12:57.714ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } result = Ok(()) uri = /v1/images/demo-image?project=demo-project
345612025-03-07T23:12:57.714ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 116194 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b9b62c78-9cd3-4051-be0e-cd77460391b1 response_code = 200 uri = /v1/images/demo-image?project=demo-project
345622025-03-07T23:12:57.715ZINFOtest_unauthorized (external client test context): client received response status = 200
345632025-03-07T23:12:57.715ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image/promote?project=demo-project
345642025-03-07T23:12:57.717ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/images/demo-image/promote?project=demo-project
345652025-03-07T23:12:57.717ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image/promote?project=demo-project
345662025-03-07T23:12:57.717ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345672025-03-07T23:12:57.717ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f121d939-409e-4504-9135-51308fb59dbc uri = /v1/images/demo-image/promote?project=demo-project
345682025-03-07T23:12:57.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 98 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f121d939-409e-4504-9135-51308fb59dbc response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345692025-03-07T23:12:57.717ZINFOtest_unauthorized (external client test context): client received response status = 405
345702025-03-07T23:12:57.717ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image/promote?project=demo-project
345712025-03-07T23:12:57.717ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345722025-03-07T23:12:57.717ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 498861b9-7498-491c-bac6-3fac33412b12 uri = /v1/images/demo-image/promote?project=demo-project
345732025-03-07T23:12:57.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 498861b9-7498-491c-bac6-3fac33412b12 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345742025-03-07T23:12:57.717ZINFOtest_unauthorized (external client test context): client received response status = 405
345752025-03-07T23:12:57.717ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image/promote?project=demo-project
345762025-03-07T23:12:57.717ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345772025-03-07T23:12:57.718ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 855357c7-3e0c-43c5-8f7b-7b3170cf0743 uri = /v1/images/demo-image/promote?project=demo-project
345782025-03-07T23:12:57.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 155 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 855357c7-3e0c-43c5-8f7b-7b3170cf0743 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345792025-03-07T23:12:57.719ZINFOtest_unauthorized (external client test context): client received response status = 405
345802025-03-07T23:12:57.719ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image/promote?project=demo-project
345812025-03-07T23:12:57.719ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345822025-03-07T23:12:57.719ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c6113f-fa4c-46bf-a30f-30f75126d26a uri = /v1/images/demo-image/promote?project=demo-project
345832025-03-07T23:12:57.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 10c6113f-fa4c-46bf-a30f-30f75126d26a response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345842025-03-07T23:12:57.719ZINFOtest_unauthorized (external client test context): client received response status = 405
345852025-03-07T23:12:57.719ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image/promote?project=demo-project
345862025-03-07T23:12:57.719ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345872025-03-07T23:12:57.720ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca26d5c3-60ee-47eb-a412-156b39abb2aa uri = /v1/images/demo-image/promote?project=demo-project
345882025-03-07T23:12:57.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 152 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ca26d5c3-60ee-47eb-a412-156b39abb2aa response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345892025-03-07T23:12:57.721ZINFOtest_unauthorized (external client test context): client received response status = 405
345902025-03-07T23:12:57.721ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image/promote?project=demo-project
345912025-03-07T23:12:57.721ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345922025-03-07T23:12:57.721ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38142306-65df-405e-9c72-eed9ba1470d0 uri = /v1/images/demo-image/promote?project=demo-project
345932025-03-07T23:12:57.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38142306-65df-405e-9c72-eed9ba1470d0 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345942025-03-07T23:12:57.721ZINFOtest_unauthorized (external client test context): client received response status = 405
345952025-03-07T23:12:57.721ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image/promote?project=demo-project
345962025-03-07T23:12:57.721ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
345972025-03-07T23:12:57.721ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bf55420a-f9e4-487d-a905-af6eb4542d4b uri = /v1/images/demo-image/promote?project=demo-project
345982025-03-07T23:12:57.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 173 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = bf55420a-f9e4-487d-a905-af6eb4542d4b response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
345992025-03-07T23:12:57.723ZINFOtest_unauthorized (external client test context): client received response status = 405
346002025-03-07T23:12:57.723ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image/promote?project=demo-project
346012025-03-07T23:12:57.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346022025-03-07T23:12:57.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c40258f8-f35f-405c-bb23-76758981a9a7 uri = /v1/images/demo-image/promote?project=demo-project
346032025-03-07T23:12:57.723ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = c40258f8-f35f-405c-bb23-76758981a9a7 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
346042025-03-07T23:12:57.723ZINFOtest_unauthorized (external client test context): client received response status = 405
346052025-03-07T23:12:57.723ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image/promote?project=demo-project
346062025-03-07T23:12:57.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346072025-03-07T23:12:57.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 uri = /v1/images/demo-image/promote?project=demo-project
346082025-03-07T23:12:57.725ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 uri = /v1/images/demo-image/promote?project=demo-project
346092025-03-07T23:12:57.725ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image/promote?project=demo-project
346102025-03-07T23:12:57.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346112025-03-07T23:12:57.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346122025-03-07T23:12:57.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346132025-03-07T23:12:57.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346142025-03-07T23:12:57.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346152025-03-07T23:12:57.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346162025-03-07T23:12:57.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
346172025-03-07T23:12:57.736ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
346182025-03-07T23:12:57.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346192025-03-07T23:12:57.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346202025-03-07T23:12:57.738ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346212025-03-07T23:12:57.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
346222025-03-07T23:12:57.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346232025-03-07T23:12:57.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346242025-03-07T23:12:57.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346252025-03-07T23:12:57.745ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
346262025-03-07T23:12:57.749ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
346272025-03-07T23:12:57.750ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346282025-03-07T23:12:57.750ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346292025-03-07T23:12:57.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346302025-03-07T23:12:57.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
346312025-03-07T23:12:57.753ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
346322025-03-07T23:12:57.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346332025-03-07T23:12:57.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346342025-03-07T23:12:57.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346352025-03-07T23:12:57.761ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
346362025-03-07T23:12:57.763ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346372025-03-07T23:12:57.763ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346382025-03-07T23:12:57.764ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346392025-03-07T23:12:57.785ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
346402025-03-07T23:12:57.789ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
346412025-03-07T23:12:57.790ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 uri = /v1/images/demo-image/promote?project=demo-project
346422025-03-07T23:12:57.790ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346432025-03-07T23:12:57.790ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346442025-03-07T23:12:57.790ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346452025-03-07T23:12:57.796ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346462025-03-07T23:12:57.797ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346472025-03-07T23:12:57.798ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346482025-03-07T23:12:57.814ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346492025-03-07T23:12:57.815ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346502025-03-07T23:12:57.816ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346512025-03-07T23:12:57.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image/promote?project=demo-project
346522025-03-07T23:12:57.828ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/images/demo-image/promote?project=demo-project
346532025-03-07T23:12:57.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346542025-03-07T23:12:57.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346552025-03-07T23:12:57.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346562025-03-07T23:12:57.833ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image/promote?project=demo-project
346572025-03-07T23:12:57.834ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346582025-03-07T23:12:57.834ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346592025-03-07T23:12:57.834ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346602025-03-07T23:12:57.842ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image/promote?project=demo-project
346612025-03-07T23:12:57.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
346622025-03-07T23:12:57.847ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346632025-03-07T23:12:57.849ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
346642025-03-07T23:12:57.882ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
346652025-03-07T23:12:57.929ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: b4efadbf-f073-46cc-bed7-f7ddeaf88e53, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image/promote?project=demo-project
346662025-03-07T23:12:57.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 206474 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b6779fce-c240-47cb-87e5-50d90d354fc7 response_code = 404 uri = /v1/images/demo-image/promote?project=demo-project
346672025-03-07T23:12:57.931ZINFOtest_unauthorized (external client test context): client received response status = 404
346682025-03-07T23:12:57.931ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image/promote?project=demo-project
346692025-03-07T23:12:57.931ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346702025-03-07T23:12:57.932ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 19c9cfc2-c1ea-4e8c-933d-62161636c2f6 uri = /v1/images/demo-image/promote?project=demo-project
346712025-03-07T23:12:57.932ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 19c9cfc2-c1ea-4e8c-933d-62161636c2f6 uri = /v1/images/demo-image/promote?project=demo-project
346722025-03-07T23:12:57.933ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 19c9cfc2-c1ea-4e8c-933d-62161636c2f6 uri = /v1/images/demo-image/promote?project=demo-project
346732025-03-07T23:12:57.933ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 19c9cfc2-c1ea-4e8c-933d-62161636c2f6 uri = /v1/images/demo-image/promote?project=demo-project
346742025-03-07T23:12:57.933ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 467 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 19c9cfc2-c1ea-4e8c-933d-62161636c2f6 response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
346752025-03-07T23:12:57.933ZINFOtest_unauthorized (external client test context): client received response status = 401
346762025-03-07T23:12:57.933ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image/promote?project=demo-project
346772025-03-07T23:12:57.933ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346782025-03-07T23:12:57.933ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93701af4-0ba6-4ff8-a66b-655aafb515ef uri = /v1/images/demo-image/promote?project=demo-project
346792025-03-07T23:12:57.933ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93701af4-0ba6-4ff8-a66b-655aafb515ef uri = /v1/images/demo-image/promote?project=demo-project
346802025-03-07T23:12:57.934ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93701af4-0ba6-4ff8-a66b-655aafb515ef uri = /v1/images/demo-image/promote?project=demo-project
346812025-03-07T23:12:57.934ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 435 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 93701af4-0ba6-4ff8-a66b-655aafb515ef response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
346822025-03-07T23:12:57.935ZINFOtest_unauthorized (external client test context): client received response status = 401
346832025-03-07T23:12:57.935ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image/promote?project=demo-project
346842025-03-07T23:12:57.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346852025-03-07T23:12:57.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b5d7574d-a040-4295-b87b-902e39ef5637 uri = /v1/images/demo-image/promote?project=demo-project
346862025-03-07T23:12:57.935ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b5d7574d-a040-4295-b87b-902e39ef5637 uri = /v1/images/demo-image/promote?project=demo-project
346872025-03-07T23:12:57.939ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4450:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4470:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b5d7574d-a040-4295-b87b-902e39ef5637 uri = /v1/images/demo-image/promote?project=demo-project
346882025-03-07T23:12:57.939ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1593 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b5d7574d-a040-4295-b87b-902e39ef5637 response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
346892025-03-07T23:12:57.939ZINFOtest_unauthorized (external client test context): client received response status = 401
346902025-03-07T23:12:57.939ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image/promote?project=demo-project
346912025-03-07T23:12:57.939ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346922025-03-07T23:12:57.939ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fa305e03-1bc3-497c-b04b-c411876c03e0 uri = /v1/images/demo-image/promote?project=demo-project
346932025-03-07T23:12:57.939ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fa305e03-1bc3-497c-b04b-c411876c03e0 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
346942025-03-07T23:12:57.939ZINFOtest_unauthorized (external client test context): client received response status = 405
346952025-03-07T23:12:57.940ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image/promote?project=demo-project
346962025-03-07T23:12:57.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
346972025-03-07T23:12:57.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ddea1c64-6cd2-4625-ab8d-a50f29e9469c uri = /v1/images/demo-image/promote?project=demo-project
346982025-03-07T23:12:57.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = ddea1c64-6cd2-4625-ab8d-a50f29e9469c response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
346992025-03-07T23:12:57.940ZINFOtest_unauthorized (external client test context): client received response status = 405
347002025-03-07T23:12:57.940ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image/promote?project=demo-project
347012025-03-07T23:12:57.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347022025-03-07T23:12:57.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0d2e4144-868a-4d70-a1b3-6c2683feb167 uri = /v1/images/demo-image/promote?project=demo-project
347032025-03-07T23:12:57.941ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 0d2e4144-868a-4d70-a1b3-6c2683feb167 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347042025-03-07T23:12:57.942ZINFOtest_unauthorized (external client test context): client received response status = 405
347052025-03-07T23:12:57.942ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image/promote?project=demo-project
347062025-03-07T23:12:57.942ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347072025-03-07T23:12:57.942ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6b1a3a09-367e-47ac-9bbf-f6b49532733e uri = /v1/images/demo-image/promote?project=demo-project
347082025-03-07T23:12:57.942ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6b1a3a09-367e-47ac-9bbf-f6b49532733e response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347092025-03-07T23:12:57.942ZINFOtest_unauthorized (external client test context): client received response status = 405
347102025-03-07T23:12:57.942ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image/promote?project=demo-project
347112025-03-07T23:12:57.943ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347122025-03-07T23:12:57.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d0ce4e6-a879-43fb-9aff-c38f5d3d4c4d uri = /v1/images/demo-image/promote?project=demo-project
347132025-03-07T23:12:57.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3d0ce4e6-a879-43fb-9aff-c38f5d3d4c4d response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347142025-03-07T23:12:57.944ZINFOtest_unauthorized (external client test context): client received response status = 405
347152025-03-07T23:12:57.944ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image/promote?project=demo-project
347162025-03-07T23:12:57.944ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347172025-03-07T23:12:57.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 84b628dc-8f27-4a71-8556-5cdc0ee1dc47 uri = /v1/images/demo-image/promote?project=demo-project
347182025-03-07T23:12:57.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 84b628dc-8f27-4a71-8556-5cdc0ee1dc47 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347192025-03-07T23:12:57.944ZINFOtest_unauthorized (external client test context): client received response status = 405
347202025-03-07T23:12:57.944ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image/promote?project=demo-project
347212025-03-07T23:12:57.944ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347222025-03-07T23:12:57.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd7b42a8-7e58-460b-bd8c-b94b9a43d0a5 uri = /v1/images/demo-image/promote?project=demo-project
347232025-03-07T23:12:57.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = dd7b42a8-7e58-460b-bd8c-b94b9a43d0a5 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347242025-03-07T23:12:57.944ZINFOtest_unauthorized (external client test context): client received response status = 405
347252025-03-07T23:12:57.944ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image/promote?project=demo-project
347262025-03-07T23:12:57.946ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/promote?project=demo-project
347272025-03-07T23:12:57.946ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = efad916c-dd32-4ed0-b4d5-72d1f4a48bbc uri = /v1/images/demo-image/promote?project=demo-project
347282025-03-07T23:12:57.946ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = efad916c-dd32-4ed0-b4d5-72d1f4a48bbc response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
347292025-03-07T23:12:57.946ZINFOtest_unauthorized (external client test context): client received response status = 405
347302025-03-07T23:12:57.946ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image/promote?project=demo-project
347312025-03-07T23:12:57.946ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image/demote?project=demo-project
347322025-03-07T23:12:57.946ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/images/demo-image/demote?project=demo-project
347332025-03-07T23:12:57.946ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image/demote?project=demo-project
347342025-03-07T23:12:57.946ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347352025-03-07T23:12:57.946ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3e2e162f-9724-4cfc-b817-d155602f18bc uri = /v1/images/demo-image/demote?project=demo-project
347362025-03-07T23:12:57.946ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3e2e162f-9724-4cfc-b817-d155602f18bc response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347372025-03-07T23:12:57.946ZINFOtest_unauthorized (external client test context): client received response status = 405
347382025-03-07T23:12:57.947ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image/demote?project=demo-project
347392025-03-07T23:12:57.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347402025-03-07T23:12:57.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 34887622-c467-44d6-b421-f628dff788b7 uri = /v1/images/demo-image/demote?project=demo-project
347412025-03-07T23:12:57.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 559 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 34887622-c467-44d6-b421-f628dff788b7 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347422025-03-07T23:12:57.948ZINFOtest_unauthorized (external client test context): client received response status = 405
347432025-03-07T23:12:57.948ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image/demote?project=demo-project
347442025-03-07T23:12:57.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347452025-03-07T23:12:57.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3b55f8c3-747c-4472-afe4-0463261dd0b1 uri = /v1/images/demo-image/demote?project=demo-project
347462025-03-07T23:12:57.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 80 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3b55f8c3-747c-4472-afe4-0463261dd0b1 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347472025-03-07T23:12:57.948ZINFOtest_unauthorized (external client test context): client received response status = 405
347482025-03-07T23:12:57.948ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image/demote?project=demo-project
347492025-03-07T23:12:57.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347502025-03-07T23:12:57.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 866beee1-3d6d-47a6-b3cc-39e00e5520c2 uri = /v1/images/demo-image/demote?project=demo-project
347512025-03-07T23:12:57.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 866beee1-3d6d-47a6-b3cc-39e00e5520c2 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347522025-03-07T23:12:57.949ZINFOtest_unauthorized (external client test context): client received response status = 405
347532025-03-07T23:12:57.950ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image/demote?project=demo-project
347542025-03-07T23:12:57.950ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347552025-03-07T23:12:57.950ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b4e55a2-4049-4c8e-b266-6ee66342bbdf uri = /v1/images/demo-image/demote?project=demo-project
347562025-03-07T23:12:57.950ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 9b4e55a2-4049-4c8e-b266-6ee66342bbdf response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347572025-03-07T23:12:57.950ZINFOtest_unauthorized (external client test context): client received response status = 405
347582025-03-07T23:12:57.951ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image/demote?project=demo-project
347592025-03-07T23:12:57.951ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347602025-03-07T23:12:57.951ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71d29814-89f0-4c98-ae39-4d35f500c7b0 uri = /v1/images/demo-image/demote?project=demo-project
347612025-03-07T23:12:57.951ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 71d29814-89f0-4c98-ae39-4d35f500c7b0 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347622025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client received response status = 405
347632025-03-07T23:12:57.952ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image/demote?project=demo-project
347642025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347652025-03-07T23:12:57.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52a80944-3a84-4c14-9211-81c5feb46532 uri = /v1/images/demo-image/demote?project=demo-project
347662025-03-07T23:12:57.952ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 52a80944-3a84-4c14-9211-81c5feb46532 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347672025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client received response status = 405
347682025-03-07T23:12:57.952ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image/demote?project=demo-project
347692025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347702025-03-07T23:12:57.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4cb91a86-5488-4394-94db-a15fe4d46872 uri = /v1/images/demo-image/demote?project=demo-project
347712025-03-07T23:12:57.952ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4cb91a86-5488-4394-94db-a15fe4d46872 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
347722025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client received response status = 405
347732025-03-07T23:12:57.952ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image/demote?project=demo-project
347742025-03-07T23:12:57.952ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
347752025-03-07T23:12:57.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 uri = /v1/images/demo-image/demote?project=demo-project
347762025-03-07T23:12:57.952ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 uri = /v1/images/demo-image/demote?project=demo-project
347772025-03-07T23:12:57.953ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image/demote?project=demo-project
347782025-03-07T23:12:57.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347792025-03-07T23:12:57.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347802025-03-07T23:12:57.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347812025-03-07T23:12:57.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347822025-03-07T23:12:57.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347832025-03-07T23:12:57.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347842025-03-07T23:12:57.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
347852025-03-07T23:12:57.968ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
347862025-03-07T23:12:57.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347872025-03-07T23:12:57.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347882025-03-07T23:12:57.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347892025-03-07T23:12:57.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
347902025-03-07T23:12:57.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347912025-03-07T23:12:57.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347922025-03-07T23:12:57.975ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347932025-03-07T23:12:57.986ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
347942025-03-07T23:12:57.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
347952025-03-07T23:12:57.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347962025-03-07T23:12:57.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347972025-03-07T23:12:57.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347982025-03-07T23:12:57.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
347992025-03-07T23:12:57.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
348002025-03-07T23:12:57.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348012025-03-07T23:12:57.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348022025-03-07T23:12:57.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348032025-03-07T23:12:57.998ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
348042025-03-07T23:12:57.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348052025-03-07T23:12:57.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348062025-03-07T23:12:58.000ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348072025-03-07T23:12:58.033ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
348082025-03-07T23:12:58.037ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
348092025-03-07T23:12:58.037ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 uri = /v1/images/demo-image/demote?project=demo-project
348102025-03-07T23:12:58.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 resource = Database uri = /v1/images/demo-image/demote?project=demo-project
348112025-03-07T23:12:58.037ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/demote?project=demo-project
348122025-03-07T23:12:58.039ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 resource = Database result = Ok(()) uri = /v1/images/demo-image/demote?project=demo-project
348132025-03-07T23:12:58.042ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 resource = Database uri = /v1/images/demo-image/demote?project=demo-project
348142025-03-07T23:12:58.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/demote?project=demo-project
348152025-03-07T23:12:58.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 resource = Database result = Ok(()) uri = /v1/images/demo-image/demote?project=demo-project
348162025-03-07T23:12:58.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo-image with name "demo-image" error_message_internal = not found: silo-image with name "demo-image" latency_us = 121798 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de73ad7d-7d45-42ae-a653-56bd90ea53d4 response_code = 404 uri = /v1/images/demo-image/demote?project=demo-project
348172025-03-07T23:12:58.072ZINFOtest_unauthorized (external client test context): client received response status = 404
348182025-03-07T23:12:58.073ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image/demote?project=demo-project
348192025-03-07T23:12:58.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348202025-03-07T23:12:58.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b090c007-9c1b-4f37-98ce-8e73208417b5 uri = /v1/images/demo-image/demote?project=demo-project
348212025-03-07T23:12:58.075ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b090c007-9c1b-4f37-98ce-8e73208417b5 uri = /v1/images/demo-image/demote?project=demo-project
348222025-03-07T23:12:58.076ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b090c007-9c1b-4f37-98ce-8e73208417b5 uri = /v1/images/demo-image/demote?project=demo-project
348232025-03-07T23:12:58.076ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b090c007-9c1b-4f37-98ce-8e73208417b5 uri = /v1/images/demo-image/demote?project=demo-project
348242025-03-07T23:12:58.076ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up current silo: Actor required latency_us = 1488 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b090c007-9c1b-4f37-98ce-8e73208417b5 response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
348252025-03-07T23:12:58.076ZINFOtest_unauthorized (external client test context): client received response status = 401
348262025-03-07T23:12:58.076ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image/demote?project=demo-project
348272025-03-07T23:12:58.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348282025-03-07T23:12:58.076ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d20c42ef-d14d-45f0-97d0-25116f7461ed uri = /v1/images/demo-image/demote?project=demo-project
348292025-03-07T23:12:58.076ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d20c42ef-d14d-45f0-97d0-25116f7461ed uri = /v1/images/demo-image/demote?project=demo-project
348302025-03-07T23:12:58.077ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d20c42ef-d14d-45f0-97d0-25116f7461ed uri = /v1/images/demo-image/demote?project=demo-project
348312025-03-07T23:12:58.086ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1536 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d20c42ef-d14d-45f0-97d0-25116f7461ed response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
348322025-03-07T23:12:58.086ZINFOtest_unauthorized (external client test context): client received response status = 401
348332025-03-07T23:12:58.086ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image/demote?project=demo-project
348342025-03-07T23:12:58.086ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348352025-03-07T23:12:58.086ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b73d6481-16c7-4465-acdd-b229309d9801 uri = /v1/images/demo-image/demote?project=demo-project
348362025-03-07T23:12:58.086ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b73d6481-16c7-4465-acdd-b229309d9801 uri = /v1/images/demo-image/demote?project=demo-project
348372025-03-07T23:12:58.087ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4481:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4503:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b73d6481-16c7-4465-acdd-b229309d9801 uri = /v1/images/demo-image/demote?project=demo-project
348382025-03-07T23:12:58.087ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2167 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = b73d6481-16c7-4465-acdd-b229309d9801 response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
348392025-03-07T23:12:58.088ZINFOtest_unauthorized (external client test context): client received response status = 401
348402025-03-07T23:12:58.088ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image/demote?project=demo-project
348412025-03-07T23:12:58.088ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348422025-03-07T23:12:58.088ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b155736c-0ce7-4cf1-a3f8-ad12c5b403a9 uri = /v1/images/demo-image/demote?project=demo-project
348432025-03-07T23:12:58.088ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b155736c-0ce7-4cf1-a3f8-ad12c5b403a9 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348442025-03-07T23:12:58.088ZINFOtest_unauthorized (external client test context): client received response status = 405
348452025-03-07T23:12:58.088ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image/demote?project=demo-project
348462025-03-07T23:12:58.088ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348472025-03-07T23:12:58.089ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6e7867d-acf8-4666-ad0f-ceaf92d78747 uri = /v1/images/demo-image/demote?project=demo-project
348482025-03-07T23:12:58.089ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e6e7867d-acf8-4666-ad0f-ceaf92d78747 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348492025-03-07T23:12:58.089ZINFOtest_unauthorized (external client test context): client received response status = 405
348502025-03-07T23:12:58.089ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image/demote?project=demo-project
348512025-03-07T23:12:58.089ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348522025-03-07T23:12:58.089ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 51d2907f-ce19-4416-a36c-4d53d0270a78 uri = /v1/images/demo-image/demote?project=demo-project
348532025-03-07T23:12:58.089ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 51d2907f-ce19-4416-a36c-4d53d0270a78 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348542025-03-07T23:12:58.091ZINFOtest_unauthorized (external client test context): client received response status = 405
348552025-03-07T23:12:58.095ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image/demote?project=demo-project
348562025-03-07T23:12:58.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348572025-03-07T23:12:58.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8ccc5af8-a843-4ac6-bf8a-064e1e414f0f uri = /v1/images/demo-image/demote?project=demo-project
348582025-03-07T23:12:58.095ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 8ccc5af8-a843-4ac6-bf8a-064e1e414f0f response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348592025-03-07T23:12:58.095ZINFOtest_unauthorized (external client test context): client received response status = 405
348602025-03-07T23:12:58.095ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image/demote?project=demo-project
348612025-03-07T23:12:58.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348622025-03-07T23:12:58.141ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cc341cb3-9fe5-42cc-b57a-c280ae72d75d uri = /v1/images/demo-image/demote?project=demo-project
348632025-03-07T23:12:58.141ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 154 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cc341cb3-9fe5-42cc-b57a-c280ae72d75d response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348642025-03-07T23:12:58.144ZINFOtest_unauthorized (external client test context): client received response status = 405
348652025-03-07T23:12:58.144ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image/demote?project=demo-project
348662025-03-07T23:12:58.144ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348672025-03-07T23:12:58.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f43ee015-ca42-4efb-9e7a-81f0c122daf1 uri = /v1/images/demo-image/demote?project=demo-project
348682025-03-07T23:12:58.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f43ee015-ca42-4efb-9e7a-81f0c122daf1 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348692025-03-07T23:12:58.145ZINFOtest_unauthorized (external client test context): client received response status = 405
348702025-03-07T23:12:58.145ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image/demote?project=demo-project
348712025-03-07T23:12:58.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348722025-03-07T23:12:58.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e3e1ab0-10f0-4585-84f7-f7f5441b5632 uri = /v1/images/demo-image/demote?project=demo-project
348732025-03-07T23:12:58.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 2e3e1ab0-10f0-4585-84f7-f7f5441b5632 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348742025-03-07T23:12:58.146ZINFOtest_unauthorized (external client test context): client received response status = 405
348752025-03-07T23:12:58.146ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image/demote?project=demo-project
348762025-03-07T23:12:58.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/images/demo-image/demote?project=demo-project
348772025-03-07T23:12:58.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 010b6a65-11b7-4373-b113-3a6118d682bc uri = /v1/images/demo-image/demote?project=demo-project
348782025-03-07T23:12:58.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 010b6a65-11b7-4373-b113-3a6118d682bc response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
348792025-03-07T23:12:58.148ZINFOtest_unauthorized (external client test context): client received response status = 405
348802025-03-07T23:12:58.149ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image/demote?project=demo-project
348812025-03-07T23:12:58.149ZINFOtest_unauthorized: test: begin endpoint url = /v1/snapshots?project=demo-project
348822025-03-07T23:12:58.149ZINFOtest_unauthorized: test: privileged GET url = /v1/snapshots?project=demo-project
348832025-03-07T23:12:58.149ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
348842025-03-07T23:12:58.149ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 uri = /v1/snapshots?project=demo-project
348852025-03-07T23:12:58.149ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 uri = /v1/snapshots?project=demo-project
348862025-03-07T23:12:58.150ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
348872025-03-07T23:12:58.150ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348882025-03-07T23:12:58.150ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348892025-03-07T23:12:58.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348902025-03-07T23:12:58.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348912025-03-07T23:12:58.157ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348922025-03-07T23:12:58.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348932025-03-07T23:12:58.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
348942025-03-07T23:12:58.158ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
348952025-03-07T23:12:58.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348962025-03-07T23:12:58.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348972025-03-07T23:12:58.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348982025-03-07T23:12:58.161ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
348992025-03-07T23:12:58.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349002025-03-07T23:12:58.161ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349012025-03-07T23:12:58.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349022025-03-07T23:12:58.174ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
349032025-03-07T23:12:58.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
349042025-03-07T23:12:58.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349052025-03-07T23:12:58.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349062025-03-07T23:12:58.184ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349072025-03-07T23:12:58.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
349082025-03-07T23:12:58.184ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
349092025-03-07T23:12:58.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349102025-03-07T23:12:58.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349112025-03-07T23:12:58.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349122025-03-07T23:12:58.188ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
349132025-03-07T23:12:58.189ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349142025-03-07T23:12:58.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349152025-03-07T23:12:58.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349162025-03-07T23:12:58.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
349172025-03-07T23:12:58.198ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
349182025-03-07T23:12:58.199ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 uri = /v1/snapshots?project=demo-project
349192025-03-07T23:12:58.199ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349202025-03-07T23:12:58.199ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349212025-03-07T23:12:58.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349222025-03-07T23:12:58.222ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
349232025-03-07T23:12:58.224ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
349242025-03-07T23:12:58.224ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
349252025-03-07T23:12:58.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
349262025-03-07T23:12:58.232ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349272025-03-07T23:12:58.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349282025-03-07T23:12:58.236ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349292025-03-07T23:12:58.240ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
349302025-03-07T23:12:58.242ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
349312025-03-07T23:12:58.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
349322025-03-07T23:12:58.243ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
349332025-03-07T23:12:58.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349342025-03-07T23:12:58.243ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349352025-03-07T23:12:58.244ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349362025-03-07T23:12:58.249ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
349372025-03-07T23:12:58.249ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
349382025-03-07T23:12:58.253ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
349392025-03-07T23:12:58.253ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349402025-03-07T23:12:58.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349412025-03-07T23:12:58.260ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349422025-03-07T23:12:58.262ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
349432025-03-07T23:12:58.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349442025-03-07T23:12:58.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349452025-03-07T23:12:58.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349462025-03-07T23:12:58.271ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
349472025-03-07T23:12:58.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
349482025-03-07T23:12:58.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
349492025-03-07T23:12:58.291ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
349502025-03-07T23:12:58.291ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349512025-03-07T23:12:58.291ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349522025-03-07T23:12:58.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349532025-03-07T23:12:58.300ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
349542025-03-07T23:12:58.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349552025-03-07T23:12:58.301ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349562025-03-07T23:12:58.305ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349572025-03-07T23:12:58.309ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
349582025-03-07T23:12:58.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349592025-03-07T23:12:58.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349602025-03-07T23:12:58.312ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349612025-03-07T23:12:58.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
349622025-03-07T23:12:58.369ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
349632025-03-07T23:12:58.369ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database uri = /v1/snapshots?project=demo-project
349642025-03-07T23:12:58.369ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
349652025-03-07T23:12:58.376ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
349662025-03-07T23:12:58.389ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
349672025-03-07T23:12:58.392ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 242128 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 05e83c18-aa65-441b-a9ee-2caecb5e5de0 response_code = 200 uri = /v1/snapshots?project=demo-project
349682025-03-07T23:12:58.392ZINFOtest_unauthorized (external client test context): client received response status = 200
349692025-03-07T23:12:58.392ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/snapshots?project=demo-project
349702025-03-07T23:12:58.392ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
349712025-03-07T23:12:58.392ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d uri = /v1/snapshots?project=demo-project
349722025-03-07T23:12:58.392ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d uri = /v1/snapshots?project=demo-project
349732025-03-07T23:12:58.392ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots?project=demo-project
349742025-03-07T23:12:58.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349752025-03-07T23:12:58.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349762025-03-07T23:12:58.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349772025-03-07T23:12:58.398ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349782025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349792025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349802025-03-07T23:12:58.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
349812025-03-07T23:12:58.424ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
349822025-03-07T23:12:58.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349832025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349842025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349852025-03-07T23:12:58.424ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
349862025-03-07T23:12:58.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349872025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349882025-03-07T23:12:58.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349892025-03-07T23:12:58.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
349902025-03-07T23:12:58.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
349912025-03-07T23:12:58.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349922025-03-07T23:12:58.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349932025-03-07T23:12:58.429ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349942025-03-07T23:12:58.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
349952025-03-07T23:12:58.430ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
349962025-03-07T23:12:58.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349972025-03-07T23:12:58.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349982025-03-07T23:12:58.431ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349992025-03-07T23:12:58.433ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
350002025-03-07T23:12:58.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350012025-03-07T23:12:58.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350022025-03-07T23:12:58.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350032025-03-07T23:12:58.438ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
350042025-03-07T23:12:58.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
350052025-03-07T23:12:58.443ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d uri = /v1/snapshots?project=demo-project
350062025-03-07T23:12:58.444ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database uri = /v1/snapshots?project=demo-project
350072025-03-07T23:12:58.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350082025-03-07T23:12:58.446ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
350092025-03-07T23:12:58.460ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database uri = /v1/snapshots?project=demo-project
350102025-03-07T23:12:58.461ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350112025-03-07T23:12:58.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
350122025-03-07T23:12:58.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
350132025-03-07T23:12:58.466ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
350142025-03-07T23:12:58.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database uri = /v1/snapshots?project=demo-project
350152025-03-07T23:12:58.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350162025-03-07T23:12:58.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
350172025-03-07T23:12:58.471ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
350182025-03-07T23:12:58.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database uri = /v1/snapshots?project=demo-project
350192025-03-07T23:12:58.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350202025-03-07T23:12:58.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
350212025-03-07T23:12:58.482ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
350222025-03-07T23:12:58.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database uri = /v1/snapshots?project=demo-project
350232025-03-07T23:12:58.482ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350242025-03-07T23:12:58.483ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
350252025-03-07T23:12:58.500ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
350262025-03-07T23:12:58.559ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/snapshots?project=demo-project
350272025-03-07T23:12:58.560ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 167853 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acc01981-f009-437e-8cff-bea5db1a305d response_code = 404 uri = /v1/snapshots?project=demo-project
350282025-03-07T23:12:58.563ZINFOtest_unauthorized (external client test context): client received response status = 404
350292025-03-07T23:12:58.565ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/snapshots?project=demo-project
350302025-03-07T23:12:58.566ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350312025-03-07T23:12:58.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d13c0810-d56f-4571-80d5-64af8d21092a uri = /v1/snapshots?project=demo-project
350322025-03-07T23:12:58.567ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d13c0810-d56f-4571-80d5-64af8d21092a uri = /v1/snapshots?project=demo-project
350332025-03-07T23:12:58.567ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d13c0810-d56f-4571-80d5-64af8d21092a uri = /v1/snapshots?project=demo-project
350342025-03-07T23:12:58.567ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d13c0810-d56f-4571-80d5-64af8d21092a uri = /v1/snapshots?project=demo-project
350352025-03-07T23:12:58.567ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 561 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d13c0810-d56f-4571-80d5-64af8d21092a response_code = 401 uri = /v1/snapshots?project=demo-project
350362025-03-07T23:12:58.567ZINFOtest_unauthorized (external client test context): client received response status = 401
350372025-03-07T23:12:58.568ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/snapshots?project=demo-project
350382025-03-07T23:12:58.569ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350392025-03-07T23:12:58.569ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74b3c65d-9e49-48a0-ad7e-28af00e2bcad uri = /v1/snapshots?project=demo-project
350402025-03-07T23:12:58.569ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74b3c65d-9e49-48a0-ad7e-28af00e2bcad uri = /v1/snapshots?project=demo-project
350412025-03-07T23:12:58.569ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74b3c65d-9e49-48a0-ad7e-28af00e2bcad uri = /v1/snapshots?project=demo-project
350422025-03-07T23:12:58.569ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 248 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 74b3c65d-9e49-48a0-ad7e-28af00e2bcad response_code = 401 uri = /v1/snapshots?project=demo-project
350432025-03-07T23:12:58.569ZINFOtest_unauthorized (external client test context): client received response status = 401
350442025-03-07T23:12:58.569ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/snapshots?project=demo-project
350452025-03-07T23:12:58.570ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350462025-03-07T23:12:58.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b9e7394-5c19-4b26-9b3c-e55de46bae62 uri = /v1/snapshots?project=demo-project
350472025-03-07T23:12:58.572ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b9e7394-5c19-4b26-9b3c-e55de46bae62 uri = /v1/snapshots?project=demo-project
350482025-03-07T23:12:58.575ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4787:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4811:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b9e7394-5c19-4b26-9b3c-e55de46bae62 uri = /v1/snapshots?project=demo-project
350492025-03-07T23:12:58.576ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 4880 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5b9e7394-5c19-4b26-9b3c-e55de46bae62 response_code = 401 uri = /v1/snapshots?project=demo-project
350502025-03-07T23:12:58.577ZINFOtest_unauthorized (external client test context): client received response status = 401
350512025-03-07T23:12:58.579ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/snapshots?project=demo-project
350522025-03-07T23:12:58.581ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350532025-03-07T23:12:58.581ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3512a67b-4af4-4c99-82f9-2aed6ac7f4cf uri = /v1/snapshots?project=demo-project
350542025-03-07T23:12:58.582ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 418 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3512a67b-4af4-4c99-82f9-2aed6ac7f4cf response_code = 405 uri = /v1/snapshots?project=demo-project
350552025-03-07T23:12:58.583ZINFOtest_unauthorized (external client test context): client received response status = 405
350562025-03-07T23:12:58.583ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/snapshots?project=demo-project
350572025-03-07T23:12:58.584ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350582025-03-07T23:12:58.584ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aaea4d7d-6259-410a-a532-f1ddf2030c47 uri = /v1/snapshots?project=demo-project
350592025-03-07T23:12:58.585ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 684 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aaea4d7d-6259-410a-a532-f1ddf2030c47 response_code = 405 uri = /v1/snapshots?project=demo-project
350602025-03-07T23:12:58.587ZINFOtest_unauthorized (external client test context): client received response status = 405
350612025-03-07T23:12:58.590ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/snapshots?project=demo-project
350622025-03-07T23:12:58.590ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350632025-03-07T23:12:58.591ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350642025-03-07T23:12:58.591ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350652025-03-07T23:12:58.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 50d64c89-49fa-4695-b74f-ea3e61ed367b uri = /v1/snapshots?project=demo-project
350662025-03-07T23:12:58.595ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 522 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 50d64c89-49fa-4695-b74f-ea3e61ed367b response_code = 405 uri = /v1/snapshots?project=demo-project
350672025-03-07T23:12:58.599ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350682025-03-07T23:12:58.602ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350692025-03-07T23:12:58.603ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350702025-03-07T23:12:58.603ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
350712025-03-07T23:12:58.603ZINFOtest_unauthorized (external client test context): client received response status = 405
350722025-03-07T23:12:58.603ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/snapshots?project=demo-project
350732025-03-07T23:12:58.604ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350742025-03-07T23:12:58.605ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4826dab0-1022-497a-a729-57d6626b07a3 uri = /v1/snapshots?project=demo-project
350752025-03-07T23:12:58.605ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 316 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4826dab0-1022-497a-a729-57d6626b07a3 response_code = 405 uri = /v1/snapshots?project=demo-project
350762025-03-07T23:12:58.606ZINFOtest_unauthorized (external client test context): client received response status = 405
350772025-03-07T23:12:58.606ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/snapshots?project=demo-project
350782025-03-07T23:12:58.620ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
350792025-03-07T23:12:58.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 uri = /v1/snapshots?project=demo-project
350802025-03-07T23:12:58.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 uri = /v1/snapshots?project=demo-project
350812025-03-07T23:12:58.623ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots?project=demo-project
350822025-03-07T23:12:58.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350832025-03-07T23:12:58.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350842025-03-07T23:12:58.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350852025-03-07T23:12:58.642ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350862025-03-07T23:12:58.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350872025-03-07T23:12:58.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350882025-03-07T23:12:58.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
350892025-03-07T23:12:58.651ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
350902025-03-07T23:12:58.651ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350912025-03-07T23:12:58.651ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350922025-03-07T23:12:58.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350932025-03-07T23:12:58.654ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
350942025-03-07T23:12:58.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350952025-03-07T23:12:58.655ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350962025-03-07T23:12:58.657ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350972025-03-07T23:12:58.660ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
350982025-03-07T23:12:58.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
350992025-03-07T23:12:58.670ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
351002025-03-07T23:12:58.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
351012025-03-07T23:12:58.672ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
351022025-03-07T23:12:58.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
351032025-03-07T23:12:58.686ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
351042025-03-07T23:12:58.686ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
351052025-03-07T23:12:58.686ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
351062025-03-07T23:12:58.689ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
351072025-03-07T23:12:58.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
351082025-03-07T23:12:58.696ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
351092025-03-07T23:12:58.696ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
351102025-03-07T23:12:58.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
351112025-03-07T23:12:58.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
351122025-03-07T23:12:58.722ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
351132025-03-07T23:12:58.722ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 uri = /v1/snapshots?project=demo-project
351142025-03-07T23:12:58.722ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database uri = /v1/snapshots?project=demo-project
351152025-03-07T23:12:58.723ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351162025-03-07T23:12:58.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
351172025-03-07T23:12:58.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database uri = /v1/snapshots?project=demo-project
351182025-03-07T23:12:58.728ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351192025-03-07T23:12:58.740ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
351202025-03-07T23:12:58.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
351212025-03-07T23:12:58.750ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
351222025-03-07T23:12:58.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database uri = /v1/snapshots?project=demo-project
351232025-03-07T23:12:58.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351242025-03-07T23:12:58.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
351252025-03-07T23:12:58.755ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
351262025-03-07T23:12:58.756ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database uri = /v1/snapshots?project=demo-project
351272025-03-07T23:12:58.756ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351282025-03-07T23:12:58.756ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
351292025-03-07T23:12:58.761ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
351302025-03-07T23:12:58.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database uri = /v1/snapshots?project=demo-project
351312025-03-07T23:12:58.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351322025-03-07T23:12:58.763ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
351332025-03-07T23:12:58.771ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
351342025-03-07T23:12:58.802ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/snapshots?project=demo-project
351352025-03-07T23:12:58.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 180605 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eadf313d-b142-45c9-a55e-eb9dd7560339 response_code = 404 uri = /v1/snapshots?project=demo-project
351362025-03-07T23:12:58.806ZINFOtest_unauthorized (external client test context): client received response status = 404
351372025-03-07T23:12:58.807ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/snapshots?project=demo-project
351382025-03-07T23:12:58.807ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351392025-03-07T23:12:58.813ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40a7f5c9-650d-4b9d-a326-9ec9cd14cf7c uri = /v1/snapshots?project=demo-project
351402025-03-07T23:12:58.816ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40a7f5c9-650d-4b9d-a326-9ec9cd14cf7c uri = /v1/snapshots?project=demo-project
351412025-03-07T23:12:58.817ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40a7f5c9-650d-4b9d-a326-9ec9cd14cf7c uri = /v1/snapshots?project=demo-project
351422025-03-07T23:12:58.817ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40a7f5c9-650d-4b9d-a326-9ec9cd14cf7c uri = /v1/snapshots?project=demo-project
351432025-03-07T23:12:58.817ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 3024 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 40a7f5c9-650d-4b9d-a326-9ec9cd14cf7c response_code = 401 uri = /v1/snapshots?project=demo-project
351442025-03-07T23:12:58.828ZINFOtest_unauthorized (external client test context): client received response status = 401
351452025-03-07T23:12:58.828ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/snapshots?project=demo-project
351462025-03-07T23:12:58.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351472025-03-07T23:12:58.829ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 976f75a7-73fd-4182-8ad5-4c79109b0a46 uri = /v1/snapshots?project=demo-project
351482025-03-07T23:12:58.831ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 976f75a7-73fd-4182-8ad5-4c79109b0a46 uri = /v1/snapshots?project=demo-project
351492025-03-07T23:12:58.833ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 976f75a7-73fd-4182-8ad5-4c79109b0a46 uri = /v1/snapshots?project=demo-project
351502025-03-07T23:12:58.833ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 3991 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 976f75a7-73fd-4182-8ad5-4c79109b0a46 response_code = 401 uri = /v1/snapshots?project=demo-project
351512025-03-07T23:12:58.834ZINFOtest_unauthorized (external client test context): client received response status = 401
351522025-03-07T23:12:58.834ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/snapshots?project=demo-project
351532025-03-07T23:12:58.835ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351542025-03-07T23:12:58.838ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44aada4b-84c6-4127-ba5f-0d8c21b13b4d uri = /v1/snapshots?project=demo-project
351552025-03-07T23:12:58.839ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44aada4b-84c6-4127-ba5f-0d8c21b13b4d uri = /v1/snapshots?project=demo-project
351562025-03-07T23:12:58.840ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4822:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4836:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44aada4b-84c6-4127-ba5f-0d8c21b13b4d uri = /v1/snapshots?project=demo-project
351572025-03-07T23:12:58.842ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3764 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 44aada4b-84c6-4127-ba5f-0d8c21b13b4d response_code = 401 uri = /v1/snapshots?project=demo-project
351582025-03-07T23:12:58.848ZINFOtest_unauthorized (external client test context): client received response status = 401
351592025-03-07T23:12:58.849ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/snapshots?project=demo-project
351602025-03-07T23:12:58.849ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351612025-03-07T23:12:58.850ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b303bae8-5e52-4157-8143-ceb545ad199a uri = /v1/snapshots?project=demo-project
351622025-03-07T23:12:58.851ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 606 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b303bae8-5e52-4157-8143-ceb545ad199a response_code = 405 uri = /v1/snapshots?project=demo-project
351632025-03-07T23:12:58.853ZINFOtest_unauthorized (external client test context): client received response status = 405
351642025-03-07T23:12:58.853ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/snapshots?project=demo-project
351652025-03-07T23:12:58.854ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351662025-03-07T23:12:58.913ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 625b0a40-3cdb-485d-8239-98b20b67f3fd uri = /v1/snapshots?project=demo-project
351672025-03-07T23:12:58.913ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 221 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 625b0a40-3cdb-485d-8239-98b20b67f3fd response_code = 405 uri = /v1/snapshots?project=demo-project
351682025-03-07T23:12:58.914ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
351692025-03-07T23:12:58.914ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
351702025-03-07T23:12:58.915ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
351712025-03-07T23:12:58.915ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
351722025-03-07T23:12:58.915ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
351732025-03-07T23:12:58.915ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
351742025-03-07T23:12:58.915ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
351752025-03-07T23:12:58.915ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
351762025-03-07T23:12:58.915ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
351772025-03-07T23:12:58.922ZINFOtest_unauthorized (external client test context): client received response status = 405
351782025-03-07T23:12:58.922ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/snapshots?project=demo-project
351792025-03-07T23:12:58.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351802025-03-07T23:12:58.923ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 868d0305-92a6-4b24-9c76-93a63d0c499f uri = /v1/snapshots?project=demo-project
351812025-03-07T23:12:58.923ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 868d0305-92a6-4b24-9c76-93a63d0c499f response_code = 405 uri = /v1/snapshots?project=demo-project
351822025-03-07T23:12:58.923ZINFOtest_unauthorized (external client test context): client received response status = 405
351832025-03-07T23:12:58.924ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/snapshots?project=demo-project
351842025-03-07T23:12:58.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351852025-03-07T23:12:58.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e85b154f-475b-400c-b794-7e7848370acf uri = /v1/snapshots?project=demo-project
351862025-03-07T23:12:58.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e85b154f-475b-400c-b794-7e7848370acf response_code = 405 uri = /v1/snapshots?project=demo-project
351872025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client received response status = 405
351882025-03-07T23:12:58.925ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/snapshots?project=demo-project
351892025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351902025-03-07T23:12:58.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cf88ee5e-7d35-46d2-8faf-b821b34d06ca uri = /v1/snapshots?project=demo-project
351912025-03-07T23:12:58.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = cf88ee5e-7d35-46d2-8faf-b821b34d06ca response_code = 405 uri = /v1/snapshots?project=demo-project
351922025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client received response status = 405
351932025-03-07T23:12:58.925ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/snapshots?project=demo-project
351942025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
351952025-03-07T23:12:58.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 89d4e8e1-3559-4aa3-bf8b-2a0c0c047670 uri = /v1/snapshots?project=demo-project
351962025-03-07T23:12:58.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 89d4e8e1-3559-4aa3-bf8b-2a0c0c047670 response_code = 405 uri = /v1/snapshots?project=demo-project
351972025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client received response status = 405
351982025-03-07T23:12:58.925ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/snapshots?project=demo-project
351992025-03-07T23:12:58.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
352002025-03-07T23:12:58.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a793e50f-3322-45c3-805a-cdc58ee32daf uri = /v1/snapshots?project=demo-project
352012025-03-07T23:12:58.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a793e50f-3322-45c3-805a-cdc58ee32daf response_code = 405 uri = /v1/snapshots?project=demo-project
352022025-03-07T23:12:58.926ZINFOtest_unauthorized (external client test context): client received response status = 405
352032025-03-07T23:12:58.926ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/snapshots?project=demo-project
352042025-03-07T23:12:58.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
352052025-03-07T23:12:58.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 271f1ce1-9ec7-4c5a-a255-989d9e17ad38 uri = /v1/snapshots?project=demo-project
352062025-03-07T23:12:58.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 271f1ce1-9ec7-4c5a-a255-989d9e17ad38 response_code = 405 uri = /v1/snapshots?project=demo-project
352072025-03-07T23:12:58.926ZINFOtest_unauthorized (external client test context): client received response status = 405
352082025-03-07T23:12:58.927ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/snapshots?project=demo-project
352092025-03-07T23:12:58.927ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots?project=demo-project
352102025-03-07T23:12:58.927ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d uri = /v1/snapshots?project=demo-project
352112025-03-07T23:12:58.927ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d uri = /v1/snapshots?project=demo-project
352122025-03-07T23:12:58.928ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
352132025-03-07T23:12:58.928ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352142025-03-07T23:12:58.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352152025-03-07T23:12:58.928ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352162025-03-07T23:12:58.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352172025-03-07T23:12:58.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352182025-03-07T23:12:58.933ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352192025-03-07T23:12:58.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
352202025-03-07T23:12:58.949ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
352212025-03-07T23:12:58.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352222025-03-07T23:12:58.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352232025-03-07T23:12:58.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352242025-03-07T23:12:58.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
352252025-03-07T23:12:58.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352262025-03-07T23:12:58.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352272025-03-07T23:12:58.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352282025-03-07T23:12:58.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
352292025-03-07T23:12:58.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
352302025-03-07T23:12:58.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352312025-03-07T23:12:58.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352322025-03-07T23:12:58.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352332025-03-07T23:12:58.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
352342025-03-07T23:12:58.998ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
352352025-03-07T23:12:58.998ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352362025-03-07T23:12:58.998ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352372025-03-07T23:12:58.999ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352382025-03-07T23:12:59.002ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
352392025-03-07T23:12:59.002ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352402025-03-07T23:12:59.002ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352412025-03-07T23:12:59.003ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352422025-03-07T23:12:59.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
352432025-03-07T23:12:59.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
352442025-03-07T23:12:59.019ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d uri = /v1/snapshots?project=demo-project
352452025-03-07T23:12:59.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352462025-03-07T23:12:59.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352472025-03-07T23:12:59.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352482025-03-07T23:12:59.026ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352492025-03-07T23:12:59.027ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352502025-03-07T23:12:59.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352512025-03-07T23:12:59.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
352522025-03-07T23:12:59.030ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
352532025-03-07T23:12:59.030ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352542025-03-07T23:12:59.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352552025-03-07T23:12:59.032ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352562025-03-07T23:12:59.035ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
352572025-03-07T23:12:59.036ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352582025-03-07T23:12:59.036ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352592025-03-07T23:12:59.037ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352602025-03-07T23:12:59.041ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
352612025-03-07T23:12:59.041ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352622025-03-07T23:12:59.041ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352632025-03-07T23:12:59.043ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352642025-03-07T23:12:59.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
352652025-03-07T23:12:59.074ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
352662025-03-07T23:12:59.079ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
352672025-03-07T23:12:59.080ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots?project=demo-project
352682025-03-07T23:12:59.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352692025-03-07T23:12:59.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352702025-03-07T23:12:59.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352712025-03-07T23:12:59.091ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
352722025-03-07T23:12:59.092ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352732025-03-07T23:12:59.092ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352742025-03-07T23:12:59.108ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352752025-03-07T23:12:59.113ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
352762025-03-07T23:12:59.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352772025-03-07T23:12:59.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352782025-03-07T23:12:59.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352792025-03-07T23:12:59.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
352802025-03-07T23:12:59.132ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
352812025-03-07T23:12:59.133ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database uri = /v1/snapshots?project=demo-project
352822025-03-07T23:12:59.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
352832025-03-07T23:12:59.134ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
352842025-03-07T23:12:59.141ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 214444 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3299d820-1375-43b0-a72b-72bbec93307d response_code = 200 uri = /v1/snapshots?project=demo-project
352852025-03-07T23:12:59.142ZINFOtest_unauthorized (external client test context): client received response status = 200
352862025-03-07T23:12:59.151ZINFOtest_unauthorized: test: begin endpoint url = /v1/snapshots/demo-snapshot?project=demo-project
352872025-03-07T23:12:59.158ZINFOtest_unauthorized: test: privileged GET url = /v1/snapshots/demo-snapshot?project=demo-project
352882025-03-07T23:12:59.158ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
352892025-03-07T23:12:59.158ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 uri = /v1/snapshots/demo-snapshot?project=demo-project
352902025-03-07T23:12:59.158ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 uri = /v1/snapshots/demo-snapshot?project=demo-project
352912025-03-07T23:12:59.158ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots/demo-snapshot?project=demo-project
352922025-03-07T23:12:59.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352932025-03-07T23:12:59.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352942025-03-07T23:12:59.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352952025-03-07T23:12:59.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352962025-03-07T23:12:59.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352972025-03-07T23:12:59.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352982025-03-07T23:12:59.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
352992025-03-07T23:12:59.181ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353002025-03-07T23:12:59.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353012025-03-07T23:12:59.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353022025-03-07T23:12:59.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353032025-03-07T23:12:59.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353042025-03-07T23:12:59.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353052025-03-07T23:12:59.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353062025-03-07T23:12:59.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353072025-03-07T23:12:59.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353082025-03-07T23:12:59.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
353092025-03-07T23:12:59.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353102025-03-07T23:12:59.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353112025-03-07T23:12:59.208ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353122025-03-07T23:12:59.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
353132025-03-07T23:12:59.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
353142025-03-07T23:12:59.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
353152025-03-07T23:12:59.222ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353162025-03-07T23:12:59.222ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353172025-03-07T23:12:59.222ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353182025-03-07T23:12:59.222ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353192025-03-07T23:12:59.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
353202025-03-07T23:12:59.222ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
353212025-03-07T23:12:59.224ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
353222025-03-07T23:12:59.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
353232025-03-07T23:12:59.229ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353242025-03-07T23:12:59.230ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353252025-03-07T23:12:59.231ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353262025-03-07T23:12:59.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353272025-03-07T23:12:59.231ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
353282025-03-07T23:12:59.234ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
353292025-03-07T23:12:59.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353302025-03-07T23:12:59.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
353312025-03-07T23:12:59.251ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 uri = /v1/snapshots/demo-snapshot?project=demo-project
353322025-03-07T23:12:59.251ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353332025-03-07T23:12:59.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353342025-03-07T23:12:59.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353352025-03-07T23:12:59.258ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353362025-03-07T23:12:59.259ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353372025-03-07T23:12:59.260ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353382025-03-07T23:12:59.284ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353392025-03-07T23:12:59.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353402025-03-07T23:12:59.287ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353412025-03-07T23:12:59.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
353422025-03-07T23:12:59.291ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
353432025-03-07T23:12:59.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353442025-03-07T23:12:59.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353452025-03-07T23:12:59.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353462025-03-07T23:12:59.308ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
353472025-03-07T23:12:59.308ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353482025-03-07T23:12:59.309ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353492025-03-07T23:12:59.309ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353502025-03-07T23:12:59.313ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
353512025-03-07T23:12:59.313ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353522025-03-07T23:12:59.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353532025-03-07T23:12:59.314ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353542025-03-07T23:12:59.320ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
353552025-03-07T23:12:59.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353562025-03-07T23:12:59.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353572025-03-07T23:12:59.344ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 202240 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 216f95d5-9dca-48d5-8134-4e29d51fe870 response_code = 200 uri = /v1/snapshots/demo-snapshot?project=demo-project
353582025-03-07T23:12:59.345ZINFOtest_unauthorized (external client test context): client received response status = 200
353592025-03-07T23:12:59.345ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
353602025-03-07T23:12:59.345ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
353612025-03-07T23:12:59.346ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 uri = /v1/snapshots/demo-snapshot?project=demo-project
353622025-03-07T23:12:59.350ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 uri = /v1/snapshots/demo-snapshot?project=demo-project
353632025-03-07T23:12:59.353ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots/demo-snapshot?project=demo-project
353642025-03-07T23:12:59.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353652025-03-07T23:12:59.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353662025-03-07T23:12:59.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353672025-03-07T23:12:59.358ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353682025-03-07T23:12:59.358ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353692025-03-07T23:12:59.359ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353702025-03-07T23:12:59.360ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
353712025-03-07T23:12:59.361ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353722025-03-07T23:12:59.361ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353732025-03-07T23:12:59.361ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353742025-03-07T23:12:59.364ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353752025-03-07T23:12:59.366ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353762025-03-07T23:12:59.366ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353772025-03-07T23:12:59.366ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353782025-03-07T23:12:59.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353792025-03-07T23:12:59.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353802025-03-07T23:12:59.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
353812025-03-07T23:12:59.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353822025-03-07T23:12:59.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353832025-03-07T23:12:59.393ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353842025-03-07T23:12:59.410ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
353852025-03-07T23:12:59.411ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353862025-03-07T23:12:59.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353872025-03-07T23:12:59.411ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353882025-03-07T23:12:59.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353892025-03-07T23:12:59.427ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353902025-03-07T23:12:59.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353912025-03-07T23:12:59.428ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353922025-03-07T23:12:59.431ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353932025-03-07T23:12:59.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353942025-03-07T23:12:59.445ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
353952025-03-07T23:12:59.445ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 uri = /v1/snapshots/demo-snapshot?project=demo-project
353962025-03-07T23:12:59.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
353972025-03-07T23:12:59.446ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
353982025-03-07T23:12:59.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
353992025-03-07T23:12:59.461ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
354002025-03-07T23:12:59.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354012025-03-07T23:12:59.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
354022025-03-07T23:12:59.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
354032025-03-07T23:12:59.467ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354042025-03-07T23:12:59.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
354052025-03-07T23:12:59.473ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
354062025-03-07T23:12:59.474ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
354072025-03-07T23:12:59.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
354082025-03-07T23:12:59.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354092025-03-07T23:12:59.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
354102025-03-07T23:12:59.489ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
354112025-03-07T23:12:59.489ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
354122025-03-07T23:12:59.490ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354132025-03-07T23:12:59.490ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
354142025-03-07T23:12:59.506ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
354152025-03-07T23:12:59.507ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
354162025-03-07T23:12:59.507ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354172025-03-07T23:12:59.507ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
354182025-03-07T23:12:59.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
354192025-03-07T23:12:59.541ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } result = Err(ObjectNotFound { type_name: Snapshot, lookup_type: ByName("demo-snapshot") }) uri = /v1/snapshots/demo-snapshot?project=demo-project
354202025-03-07T23:12:59.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: snapshot with name "demo-snapshot" error_message_internal = not found: snapshot with name "demo-snapshot" latency_us = 195755 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 099f9313-337a-4589-9eb8-b1455f7fed62 response_code = 404 uri = /v1/snapshots/demo-snapshot?project=demo-project
354212025-03-07T23:12:59.542ZINFOtest_unauthorized (external client test context): client received response status = 404
354222025-03-07T23:12:59.543ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
354232025-03-07T23:12:59.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354242025-03-07T23:12:59.544ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8ec65a8-741a-4f70-add7-1d77e6bde49c uri = /v1/snapshots/demo-snapshot?project=demo-project
354252025-03-07T23:12:59.544ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8ec65a8-741a-4f70-add7-1d77e6bde49c uri = /v1/snapshots/demo-snapshot?project=demo-project
354262025-03-07T23:12:59.544ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8ec65a8-741a-4f70-add7-1d77e6bde49c uri = /v1/snapshots/demo-snapshot?project=demo-project
354272025-03-07T23:12:59.544ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8ec65a8-741a-4f70-add7-1d77e6bde49c uri = /v1/snapshots/demo-snapshot?project=demo-project
354282025-03-07T23:12:59.544ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 378 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b8ec65a8-741a-4f70-add7-1d77e6bde49c response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
354292025-03-07T23:12:59.544ZINFOtest_unauthorized (external client test context): client received response status = 401
354302025-03-07T23:12:59.544ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
354312025-03-07T23:12:59.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354322025-03-07T23:12:59.545ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d75b384a-aad5-44b4-952e-fa6f0f015abd uri = /v1/snapshots/demo-snapshot?project=demo-project
354332025-03-07T23:12:59.545ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d75b384a-aad5-44b4-952e-fa6f0f015abd uri = /v1/snapshots/demo-snapshot?project=demo-project
354342025-03-07T23:12:59.547ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d75b384a-aad5-44b4-952e-fa6f0f015abd uri = /v1/snapshots/demo-snapshot?project=demo-project
354352025-03-07T23:12:59.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 465 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = d75b384a-aad5-44b4-952e-fa6f0f015abd response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
354362025-03-07T23:12:59.547ZINFOtest_unauthorized (external client test context): client received response status = 401
354372025-03-07T23:12:59.547ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
354382025-03-07T23:12:59.547ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354392025-03-07T23:12:59.547ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b7f1184-e8d0-43ac-8be7-0d64b3b38000 uri = /v1/snapshots/demo-snapshot?project=demo-project
354402025-03-07T23:12:59.547ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b7f1184-e8d0-43ac-8be7-0d64b3b38000 uri = /v1/snapshots/demo-snapshot?project=demo-project
354412025-03-07T23:12:59.547ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4847:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4865:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b7f1184-e8d0-43ac-8be7-0d64b3b38000 uri = /v1/snapshots/demo-snapshot?project=demo-project
354422025-03-07T23:12:59.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 939 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0b7f1184-e8d0-43ac-8be7-0d64b3b38000 response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
354432025-03-07T23:12:59.549ZINFOtest_unauthorized (external client test context): client received response status = 401
354442025-03-07T23:12:59.549ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
354452025-03-07T23:12:59.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354462025-03-07T23:12:59.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b3ac5018-d365-466d-935a-c2b0c45565c5 uri = /v1/snapshots/demo-snapshot?project=demo-project
354472025-03-07T23:12:59.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b3ac5018-d365-466d-935a-c2b0c45565c5 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354482025-03-07T23:12:59.549ZINFOtest_unauthorized (external client test context): client received response status = 405
354492025-03-07T23:12:59.549ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
354502025-03-07T23:12:59.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354512025-03-07T23:12:59.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8762049-5c48-45c4-9b6c-a035a1eee769 uri = /v1/snapshots/demo-snapshot?project=demo-project
354522025-03-07T23:12:59.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 177 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = b8762049-5c48-45c4-9b6c-a035a1eee769 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354532025-03-07T23:12:59.551ZINFOtest_unauthorized (external client test context): client received response status = 405
354542025-03-07T23:12:59.551ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
354552025-03-07T23:12:59.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354562025-03-07T23:12:59.551ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 27e23401-ee6b-4230-a709-5e28a46e2689 uri = /v1/snapshots/demo-snapshot?project=demo-project
354572025-03-07T23:12:59.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 27e23401-ee6b-4230-a709-5e28a46e2689 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354582025-03-07T23:12:59.551ZINFOtest_unauthorized (external client test context): client received response status = 405
354592025-03-07T23:12:59.551ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
354602025-03-07T23:12:59.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354612025-03-07T23:12:59.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 977386ab-1904-4765-90bc-c0ba61f9ade1 uri = /v1/snapshots/demo-snapshot?project=demo-project
354622025-03-07T23:12:59.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 267 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 977386ab-1904-4765-90bc-c0ba61f9ade1 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354632025-03-07T23:12:59.553ZINFOtest_unauthorized (external client test context): client received response status = 405
354642025-03-07T23:12:59.553ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
354652025-03-07T23:12:59.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354662025-03-07T23:12:59.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ff75ccdc-38c5-4a9d-ae28-0259456f0974 uri = /v1/snapshots/demo-snapshot?project=demo-project
354672025-03-07T23:12:59.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ff75ccdc-38c5-4a9d-ae28-0259456f0974 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354682025-03-07T23:12:59.553ZINFOtest_unauthorized (external client test context): client received response status = 405
354692025-03-07T23:12:59.554ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
354702025-03-07T23:12:59.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354712025-03-07T23:12:59.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 467e04a8-c7f4-4216-ad57-3809e51cd120 uri = /v1/snapshots/demo-snapshot?project=demo-project
354722025-03-07T23:12:59.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 185 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 467e04a8-c7f4-4216-ad57-3809e51cd120 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354732025-03-07T23:12:59.555ZINFOtest_unauthorized (external client test context): client received response status = 405
354742025-03-07T23:12:59.555ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
354752025-03-07T23:12:59.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354762025-03-07T23:12:59.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 086b31c9-5c60-407d-baef-e747a06444e9 uri = /v1/snapshots/demo-snapshot?project=demo-project
354772025-03-07T23:12:59.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 184 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 086b31c9-5c60-407d-baef-e747a06444e9 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354782025-03-07T23:12:59.557ZINFOtest_unauthorized (external client test context): client received response status = 405
354792025-03-07T23:12:59.557ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
354802025-03-07T23:12:59.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354812025-03-07T23:12:59.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de1c89af-9786-485c-b7df-d35479a3db78 uri = /v1/snapshots/demo-snapshot?project=demo-project
354822025-03-07T23:12:59.558ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = de1c89af-9786-485c-b7df-d35479a3db78 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
354832025-03-07T23:12:59.558ZINFOtest_unauthorized (external client test context): client received response status = 405
354842025-03-07T23:12:59.558ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
354852025-03-07T23:12:59.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
354862025-03-07T23:12:59.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 uri = /v1/snapshots/demo-snapshot?project=demo-project
354872025-03-07T23:12:59.558ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 uri = /v1/snapshots/demo-snapshot?project=demo-project
354882025-03-07T23:12:59.558ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots/demo-snapshot?project=demo-project
354892025-03-07T23:12:59.558ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354902025-03-07T23:12:59.558ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354912025-03-07T23:12:59.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354922025-03-07T23:12:59.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354932025-03-07T23:12:59.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354942025-03-07T23:12:59.564ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354952025-03-07T23:12:59.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
354962025-03-07T23:12:59.568ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
354972025-03-07T23:12:59.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354982025-03-07T23:12:59.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354992025-03-07T23:12:59.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355002025-03-07T23:12:59.572ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
355012025-03-07T23:12:59.573ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355022025-03-07T23:12:59.573ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
355032025-03-07T23:12:59.574ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355042025-03-07T23:12:59.574ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355052025-03-07T23:12:59.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355062025-03-07T23:12:59.574ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 264d459e-f3e9-4f92-aa60-30e847cc68a2 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355072025-03-07T23:12:59.575ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 264d459e-f3e9-4f92-aa60-30e847cc68a2 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355082025-03-07T23:12:59.575ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 264d459e-f3e9-4f92-aa60-30e847cc68a2 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355092025-03-07T23:12:59.575ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 264d459e-f3e9-4f92-aa60-30e847cc68a2 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355102025-03-07T23:12:59.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
355112025-03-07T23:12:59.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
355122025-03-07T23:12:59.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355132025-03-07T23:12:59.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355142025-03-07T23:12:59.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355152025-03-07T23:12:59.586ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11091 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 264d459e-f3e9-4f92-aa60-30e847cc68a2 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
355162025-03-07T23:12:59.587ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "264d459e-f3e9-4f92-aa60-30e847cc68a2", "content-length": "405", "date": "Fri, 07 Mar 2025 23:12:59 GMT"} })
355172025-03-07T23:12:59.588ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355182025-03-07T23:12:59.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
355192025-03-07T23:12:59.588ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
355202025-03-07T23:12:59.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355212025-03-07T23:12:59.588ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355222025-03-07T23:12:59.589ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355232025-03-07T23:12:59.590ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355242025-03-07T23:12:59.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355252025-03-07T23:12:59.592ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355262025-03-07T23:12:59.593ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355272025-03-07T23:12:59.593ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355282025-03-07T23:12:59.593ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355292025-03-07T23:12:59.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
355302025-03-07T23:12:59.594ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355312025-03-07T23:12:59.594ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355322025-03-07T23:12:59.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355332025-03-07T23:12:59.599ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9383 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
355342025-03-07T23:12:59.600ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355352025-03-07T23:12:59.601ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355362025-03-07T23:12:59.602ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355372025-03-07T23:12:59.602ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355382025-03-07T23:12:59.602ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "5fcf9d60-729e-4d8c-bb3c-bf01f0b6fdbc", "content-length": "29", "date": "Fri, 07 Mar 2025 23:12:59 GMT"} })
355392025-03-07T23:12:59.602ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
355402025-03-07T23:12:59.602ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
355412025-03-07T23:12:59.602ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
355422025-03-07T23:12:59.603ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
355432025-03-07T23:12:59.607ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
355442025-03-07T23:12:59.613ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 uri = /v1/snapshots/demo-snapshot?project=demo-project
355452025-03-07T23:12:59.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355462025-03-07T23:12:59.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355472025-03-07T23:12:59.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355482025-03-07T23:12:59.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355492025-03-07T23:12:59.614ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355502025-03-07T23:12:59.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355512025-03-07T23:12:59.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355522025-03-07T23:12:59.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355532025-03-07T23:12:59.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355542025-03-07T23:12:59.651ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
355552025-03-07T23:12:59.651ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
355562025-03-07T23:12:59.651ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355572025-03-07T23:12:59.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355582025-03-07T23:12:59.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355592025-03-07T23:12:59.659ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
355602025-03-07T23:12:59.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355612025-03-07T23:12:59.659ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355622025-03-07T23:12:59.659ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355632025-03-07T23:12:59.666ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
355642025-03-07T23:12:59.666ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
355652025-03-07T23:12:59.666ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355662025-03-07T23:12:59.667ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
355672025-03-07T23:12:59.677ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
355682025-03-07T23:12:59.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } result = Err(ObjectNotFound { type_name: Snapshot, lookup_type: ByName("demo-snapshot") }) uri = /v1/snapshots/demo-snapshot?project=demo-project
355692025-03-07T23:12:59.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: snapshot with name "demo-snapshot" error_message_internal = not found: snapshot with name "demo-snapshot" latency_us = 162507 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6e5f99bb-d10c-4876-a2df-b5750daf7698 response_code = 404 uri = /v1/snapshots/demo-snapshot?project=demo-project
355702025-03-07T23:12:59.722ZINFOtest_unauthorized (external client test context): client received response status = 404
355712025-03-07T23:12:59.722ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
355722025-03-07T23:12:59.722ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
355732025-03-07T23:12:59.722ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c6bd8c47-cc82-4d87-82cb-c6aa3e7b655f uri = /v1/snapshots/demo-snapshot?project=demo-project
355742025-03-07T23:12:59.722ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c6bd8c47-cc82-4d87-82cb-c6aa3e7b655f uri = /v1/snapshots/demo-snapshot?project=demo-project
355752025-03-07T23:12:59.722ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c6bd8c47-cc82-4d87-82cb-c6aa3e7b655f uri = /v1/snapshots/demo-snapshot?project=demo-project
355762025-03-07T23:12:59.722ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c6bd8c47-cc82-4d87-82cb-c6aa3e7b655f uri = /v1/snapshots/demo-snapshot?project=demo-project
355772025-03-07T23:12:59.740ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 17663 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = c6bd8c47-cc82-4d87-82cb-c6aa3e7b655f response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
355782025-03-07T23:12:59.745ZINFOtest_unauthorized (external client test context): client received response status = 401
355792025-03-07T23:12:59.746ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
355802025-03-07T23:12:59.746ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
355812025-03-07T23:12:59.748ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a318592-493d-45d8-854b-cf6b386f7c0d uri = /v1/snapshots/demo-snapshot?project=demo-project
355822025-03-07T23:12:59.749ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a318592-493d-45d8-854b-cf6b386f7c0d uri = /v1/snapshots/demo-snapshot?project=demo-project
355832025-03-07T23:12:59.749ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a318592-493d-45d8-854b-cf6b386f7c0d uri = /v1/snapshots/demo-snapshot?project=demo-project
355842025-03-07T23:12:59.749ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 401 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6a318592-493d-45d8-854b-cf6b386f7c0d response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
355852025-03-07T23:12:59.749ZINFOtest_unauthorized (external client test context): client received response status = 401
355862025-03-07T23:12:59.749ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
355872025-03-07T23:12:59.749ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
355882025-03-07T23:12:59.749ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 14101c23-5e4e-4de5-8bbc-28fcb82db10c uri = /v1/snapshots/demo-snapshot?project=demo-project
355892025-03-07T23:12:59.749ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 14101c23-5e4e-4de5-8bbc-28fcb82db10c uri = /v1/snapshots/demo-snapshot?project=demo-project
355902025-03-07T23:12:59.751ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4876:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4893:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 14101c23-5e4e-4de5-8bbc-28fcb82db10c uri = /v1/snapshots/demo-snapshot?project=demo-project
355912025-03-07T23:12:59.751ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1168 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 14101c23-5e4e-4de5-8bbc-28fcb82db10c response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
355922025-03-07T23:12:59.751ZINFOtest_unauthorized (external client test context): client received response status = 401
355932025-03-07T23:12:59.751ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
355942025-03-07T23:12:59.751ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
355952025-03-07T23:12:59.751ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a1e0c78b-7251-4b84-bfaa-f34c52fd25d7 uri = /v1/snapshots/demo-snapshot?project=demo-project
355962025-03-07T23:12:59.751ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = a1e0c78b-7251-4b84-bfaa-f34c52fd25d7 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
355972025-03-07T23:12:59.751ZINFOtest_unauthorized (external client test context): client received response status = 405
355982025-03-07T23:12:59.751ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
355992025-03-07T23:12:59.753ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
356002025-03-07T23:12:59.753ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 599c7bc9-6e11-4ebd-b758-f3c0ada504d2 uri = /v1/snapshots/demo-snapshot?project=demo-project
356012025-03-07T23:12:59.753ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 599c7bc9-6e11-4ebd-b758-f3c0ada504d2 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
356022025-03-07T23:12:59.753ZINFOtest_unauthorized (external client test context): client received response status = 405
356032025-03-07T23:12:59.753ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
356042025-03-07T23:12:59.753ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
356052025-03-07T23:12:59.753ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b21d38ec-4585-45f4-a610-2571d3369e78 uri = /v1/snapshots/demo-snapshot?project=demo-project
356062025-03-07T23:12:59.753ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = b21d38ec-4585-45f4-a610-2571d3369e78 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
356072025-03-07T23:12:59.753ZINFOtest_unauthorized (external client test context): client received response status = 405
356082025-03-07T23:12:59.753ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
356092025-03-07T23:12:59.753ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
356102025-03-07T23:12:59.753ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c480d9ae-084a-4a8e-8f84-d5ee436caa7b uri = /v1/snapshots/demo-snapshot?project=demo-project
356112025-03-07T23:12:59.754ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1270 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = c480d9ae-084a-4a8e-8f84-d5ee436caa7b response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
356122025-03-07T23:12:59.755ZINFOtest_unauthorized (external client test context): client received response status = 405
356132025-03-07T23:12:59.755ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/snapshots/demo-snapshot?project=demo-project
356142025-03-07T23:12:59.755ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/snapshots/demo-snapshot?project=demo-project
356152025-03-07T23:12:59.755ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca uri = /v1/snapshots/demo-snapshot?project=demo-project
356162025-03-07T23:12:59.755ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca uri = /v1/snapshots/demo-snapshot?project=demo-project
356172025-03-07T23:12:59.755ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots/demo-snapshot?project=demo-project
356182025-03-07T23:12:59.755ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356192025-03-07T23:12:59.756ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356202025-03-07T23:12:59.756ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356212025-03-07T23:12:59.761ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356222025-03-07T23:12:59.763ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356232025-03-07T23:12:59.764ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356242025-03-07T23:12:59.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
356252025-03-07T23:12:59.772ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
356262025-03-07T23:12:59.773ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356272025-03-07T23:12:59.773ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356282025-03-07T23:12:59.777ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356292025-03-07T23:12:59.800ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
356302025-03-07T23:12:59.800ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356312025-03-07T23:12:59.800ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356322025-03-07T23:12:59.801ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356332025-03-07T23:12:59.807ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
356342025-03-07T23:12:59.822ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
356352025-03-07T23:12:59.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356362025-03-07T23:12:59.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356372025-03-07T23:12:59.823ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356382025-03-07T23:12:59.846ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
356392025-03-07T23:12:59.846ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
356402025-03-07T23:12:59.846ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356412025-03-07T23:12:59.846ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356422025-03-07T23:12:59.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356432025-03-07T23:12:59.855ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
356442025-03-07T23:12:59.855ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356452025-03-07T23:12:59.855ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356462025-03-07T23:12:59.857ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356472025-03-07T23:12:59.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
356482025-03-07T23:12:59.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
356492025-03-07T23:12:59.864ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca uri = /v1/snapshots/demo-snapshot?project=demo-project
356502025-03-07T23:12:59.865ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356512025-03-07T23:12:59.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356522025-03-07T23:12:59.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356532025-03-07T23:12:59.882ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356542025-03-07T23:12:59.882ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356552025-03-07T23:12:59.882ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356562025-03-07T23:12:59.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356572025-03-07T23:12:59.885ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356582025-03-07T23:12:59.885ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356592025-03-07T23:12:59.888ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
356602025-03-07T23:12:59.888ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
356612025-03-07T23:12:59.888ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356622025-03-07T23:12:59.888ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356632025-03-07T23:12:59.889ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356642025-03-07T23:12:59.894ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
356652025-03-07T23:12:59.894ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356662025-03-07T23:12:59.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356672025-03-07T23:12:59.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356682025-03-07T23:12:59.906ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
356692025-03-07T23:12:59.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
356702025-03-07T23:12:59.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356712025-03-07T23:12:59.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356722025-03-07T23:12:59.919ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots/demo-snapshot?project=demo-project
356732025-03-07T23:12:59.919ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: baf11f31-f9c7-45fa-9f16-3a56e0173fed, lookup_type: ByName("demo-snapshot") } result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
356742025-03-07T23:12:59.919ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 163584 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e045a3b2-5652-45dd-9103-8be584b415ca response_code = 200 uri = /v1/snapshots/demo-snapshot?project=demo-project
356752025-03-07T23:12:59.919ZINFOtest_unauthorized (external client test context): client received response status = 200
356762025-03-07T23:12:59.920ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances?project=demo-project
356772025-03-07T23:12:59.921ZINFOtest_unauthorized: test: privileged GET url = /v1/instances?project=demo-project
356782025-03-07T23:12:59.921ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
356792025-03-07T23:12:59.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b uri = /v1/instances?project=demo-project
356802025-03-07T23:12:59.921ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b uri = /v1/instances?project=demo-project
356812025-03-07T23:12:59.921ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
356822025-03-07T23:12:59.921ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356832025-03-07T23:12:59.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356842025-03-07T23:12:59.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356852025-03-07T23:12:59.925ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356862025-03-07T23:12:59.925ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356872025-03-07T23:12:59.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356882025-03-07T23:12:59.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
356892025-03-07T23:12:59.928ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
356902025-03-07T23:12:59.928ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356912025-03-07T23:12:59.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356922025-03-07T23:12:59.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356932025-03-07T23:12:59.931ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
356942025-03-07T23:12:59.931ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356952025-03-07T23:12:59.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356962025-03-07T23:12:59.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356972025-03-07T23:12:59.934ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
356982025-03-07T23:12:59.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
356992025-03-07T23:12:59.956ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357002025-03-07T23:12:59.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357012025-03-07T23:12:59.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357022025-03-07T23:12:59.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
357032025-03-07T23:12:59.970ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
357042025-03-07T23:12:59.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357052025-03-07T23:12:59.970ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357062025-03-07T23:12:59.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357072025-03-07T23:12:59.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
357082025-03-07T23:12:59.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357092025-03-07T23:12:59.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357102025-03-07T23:12:59.975ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357112025-03-07T23:12:59.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
357122025-03-07T23:12:59.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
357132025-03-07T23:12:59.991ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b uri = /v1/instances?project=demo-project
357142025-03-07T23:12:59.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357152025-03-07T23:12:59.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357162025-03-07T23:12:59.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357172025-03-07T23:12:59.999ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357182025-03-07T23:13:00.000ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357192025-03-07T23:13:00.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357202025-03-07T23:13:00.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
357212025-03-07T23:13:00.015ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
357222025-03-07T23:13:00.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357232025-03-07T23:13:00.015ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357242025-03-07T23:13:00.016ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357252025-03-07T23:13:00.019ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
357262025-03-07T23:13:00.019ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357272025-03-07T23:13:00.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357282025-03-07T23:13:00.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357292025-03-07T23:13:00.027ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
357302025-03-07T23:13:00.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357312025-03-07T23:13:00.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357322025-03-07T23:13:00.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357332025-03-07T23:13:00.041ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
357342025-03-07T23:13:00.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
357352025-03-07T23:13:00.064ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
357362025-03-07T23:13:00.064ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
357372025-03-07T23:13:00.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357382025-03-07T23:13:00.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357392025-03-07T23:13:00.066ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357402025-03-07T23:13:00.075ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
357412025-03-07T23:13:00.075ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357422025-03-07T23:13:00.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357432025-03-07T23:13:00.076ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357442025-03-07T23:13:00.084ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
357452025-03-07T23:13:00.085ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357462025-03-07T23:13:00.085ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357472025-03-07T23:13:00.086ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357482025-03-07T23:13:00.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
357492025-03-07T23:13:00.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
357502025-03-07T23:13:00.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database uri = /v1/instances?project=demo-project
357512025-03-07T23:13:00.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
357522025-03-07T23:13:00.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
357532025-03-07T23:13:00.125ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 204779 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = e2388299-f614-46bc-a94a-c443352f3c0b response_code = 200 uri = /v1/instances?project=demo-project
357542025-03-07T23:13:00.126ZINFOtest_unauthorized (external client test context): client received response status = 200
357552025-03-07T23:13:00.127ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances?project=demo-project
357562025-03-07T23:13:00.127ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
357572025-03-07T23:13:00.127ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 uri = /v1/instances?project=demo-project
357582025-03-07T23:13:00.127ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 uri = /v1/instances?project=demo-project
357592025-03-07T23:13:00.127ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances?project=demo-project
357602025-03-07T23:13:00.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357612025-03-07T23:13:00.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357622025-03-07T23:13:00.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357632025-03-07T23:13:00.131ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357642025-03-07T23:13:00.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357652025-03-07T23:13:00.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357662025-03-07T23:13:00.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
357672025-03-07T23:13:00.157ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
357682025-03-07T23:13:00.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357692025-03-07T23:13:00.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357702025-03-07T23:13:00.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357712025-03-07T23:13:00.164ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
357722025-03-07T23:13:00.164ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357732025-03-07T23:13:00.164ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357742025-03-07T23:13:00.167ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357752025-03-07T23:13:00.169ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
357762025-03-07T23:13:00.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
357772025-03-07T23:13:00.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357782025-03-07T23:13:00.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357792025-03-07T23:13:00.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357802025-03-07T23:13:00.223ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
357812025-03-07T23:13:00.223ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
357822025-03-07T23:13:00.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
357832025-03-07T23:13:00.224ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
357842025-03-07T23:13:00.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357852025-03-07T23:13:00.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357862025-03-07T23:13:00.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357872025-03-07T23:13:00.232ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
357882025-03-07T23:13:00.234ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
357892025-03-07T23:13:00.239ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
357902025-03-07T23:13:00.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357912025-03-07T23:13:00.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357922025-03-07T23:13:00.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357932025-03-07T23:13:00.252ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
357942025-03-07T23:13:00.252ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
357952025-03-07T23:13:00.252ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
357962025-03-07T23:13:00.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
357972025-03-07T23:13:00.268ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 uri = /v1/instances?project=demo-project
357982025-03-07T23:13:00.268ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database uri = /v1/instances?project=demo-project
357992025-03-07T23:13:00.268ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358002025-03-07T23:13:00.269ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
358012025-03-07T23:13:00.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database uri = /v1/instances?project=demo-project
358022025-03-07T23:13:00.273ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358032025-03-07T23:13:00.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
358042025-03-07T23:13:00.289ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
358052025-03-07T23:13:00.290ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
358062025-03-07T23:13:00.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
358072025-03-07T23:13:00.290ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
358082025-03-07T23:13:00.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database uri = /v1/instances?project=demo-project
358092025-03-07T23:13:00.291ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358102025-03-07T23:13:00.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
358112025-03-07T23:13:00.300ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
358122025-03-07T23:13:00.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database uri = /v1/instances?project=demo-project
358132025-03-07T23:13:00.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358142025-03-07T23:13:00.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
358152025-03-07T23:13:00.313ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
358162025-03-07T23:13:00.313ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database uri = /v1/instances?project=demo-project
358172025-03-07T23:13:00.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358182025-03-07T23:13:00.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
358192025-03-07T23:13:00.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
358202025-03-07T23:13:00.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/instances?project=demo-project
358212025-03-07T23:13:00.354ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 224661 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3ae46afa-1c40-4c03-be63-5bb8e827cb79 response_code = 404 uri = /v1/instances?project=demo-project
358222025-03-07T23:13:00.354ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
358232025-03-07T23:13:00.354ZINFOtest_unauthorized (external client test context): client received response status = 404
358242025-03-07T23:13:00.354ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances?project=demo-project
358252025-03-07T23:13:00.354ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358262025-03-07T23:13:00.354ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2c8387-f055-4199-9288-533ee5e384fd uri = /v1/instances?project=demo-project
358272025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2c8387-f055-4199-9288-533ee5e384fd uri = /v1/instances?project=demo-project
358282025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2c8387-f055-4199-9288-533ee5e384fd uri = /v1/instances?project=demo-project
358292025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2c8387-f055-4199-9288-533ee5e384fd uri = /v1/instances?project=demo-project
358302025-03-07T23:13:00.355ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 332 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 7a2c8387-f055-4199-9288-533ee5e384fd response_code = 401 uri = /v1/instances?project=demo-project
358312025-03-07T23:13:00.355ZINFOtest_unauthorized (external client test context): client received response status = 401
358322025-03-07T23:13:00.355ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances?project=demo-project
358332025-03-07T23:13:00.355ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358342025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f689b2cf-487e-4da3-88ee-62e882e9632b uri = /v1/instances?project=demo-project
358352025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f689b2cf-487e-4da3-88ee-62e882e9632b uri = /v1/instances?project=demo-project
358362025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f689b2cf-487e-4da3-88ee-62e882e9632b uri = /v1/instances?project=demo-project
358372025-03-07T23:13:00.355ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 177 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f689b2cf-487e-4da3-88ee-62e882e9632b response_code = 401 uri = /v1/instances?project=demo-project
358382025-03-07T23:13:00.355ZINFOtest_unauthorized (external client test context): client received response status = 401
358392025-03-07T23:13:00.355ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances?project=demo-project
358402025-03-07T23:13:00.355ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358412025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07a537bf-b709-4036-a37f-4262b5aaf7da uri = /v1/instances?project=demo-project
358422025-03-07T23:13:00.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07a537bf-b709-4036-a37f-4262b5aaf7da uri = /v1/instances?project=demo-project
358432025-03-07T23:13:00.363ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2045:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2064:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07a537bf-b709-4036-a37f-4262b5aaf7da uri = /v1/instances?project=demo-project
358442025-03-07T23:13:00.363ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2764 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 07a537bf-b709-4036-a37f-4262b5aaf7da response_code = 401 uri = /v1/instances?project=demo-project
358452025-03-07T23:13:00.363ZINFOtest_unauthorized (external client test context): client received response status = 401
358462025-03-07T23:13:00.363ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances?project=demo-project
358472025-03-07T23:13:00.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358482025-03-07T23:13:00.363ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 856c6281-a976-4849-b102-41c2ce539d50 uri = /v1/instances?project=demo-project
358492025-03-07T23:13:00.363ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 856c6281-a976-4849-b102-41c2ce539d50 response_code = 405 uri = /v1/instances?project=demo-project
358502025-03-07T23:13:00.363ZINFOtest_unauthorized (external client test context): client received response status = 405
358512025-03-07T23:13:00.363ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances?project=demo-project
358522025-03-07T23:13:00.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358532025-03-07T23:13:00.363ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aa102fb9-871c-4395-a84b-1c2ec61fe245 uri = /v1/instances?project=demo-project
358542025-03-07T23:13:00.363ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = aa102fb9-871c-4395-a84b-1c2ec61fe245 response_code = 405 uri = /v1/instances?project=demo-project
358552025-03-07T23:13:00.363ZINFOtest_unauthorized (external client test context): client received response status = 405
358562025-03-07T23:13:00.364ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances?project=demo-project
358572025-03-07T23:13:00.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358582025-03-07T23:13:00.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8ce11732-af02-4a7d-873e-d29487505198 uri = /v1/instances?project=demo-project
358592025-03-07T23:13:00.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 8ce11732-af02-4a7d-873e-d29487505198 response_code = 405 uri = /v1/instances?project=demo-project
358602025-03-07T23:13:00.364ZINFOtest_unauthorized (external client test context): client received response status = 405
358612025-03-07T23:13:00.364ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances?project=demo-project
358622025-03-07T23:13:00.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358632025-03-07T23:13:00.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 906fe1d4-7c28-4df3-9611-b79bbb081867 uri = /v1/instances?project=demo-project
358642025-03-07T23:13:00.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 906fe1d4-7c28-4df3-9611-b79bbb081867 response_code = 405 uri = /v1/instances?project=demo-project
358652025-03-07T23:13:00.364ZINFOtest_unauthorized (external client test context): client received response status = 405
358662025-03-07T23:13:00.364ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances?project=demo-project
358672025-03-07T23:13:00.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
358682025-03-07T23:13:00.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c uri = /v1/instances?project=demo-project
358692025-03-07T23:13:00.370ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c uri = /v1/instances?project=demo-project
358702025-03-07T23:13:00.370ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances?project=demo-project
358712025-03-07T23:13:00.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358722025-03-07T23:13:00.370ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358732025-03-07T23:13:00.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358742025-03-07T23:13:00.378ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358752025-03-07T23:13:00.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358762025-03-07T23:13:00.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358772025-03-07T23:13:00.384ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
358782025-03-07T23:13:00.384ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
358792025-03-07T23:13:00.384ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358802025-03-07T23:13:00.385ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358812025-03-07T23:13:00.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358822025-03-07T23:13:00.390ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
358832025-03-07T23:13:00.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358842025-03-07T23:13:00.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358852025-03-07T23:13:00.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358862025-03-07T23:13:00.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
358872025-03-07T23:13:00.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
358882025-03-07T23:13:00.405ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358892025-03-07T23:13:00.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358902025-03-07T23:13:00.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358912025-03-07T23:13:00.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
358922025-03-07T23:13:00.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
358932025-03-07T23:13:00.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358942025-03-07T23:13:00.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358952025-03-07T23:13:00.418ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358962025-03-07T23:13:00.436ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
358972025-03-07T23:13:00.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358982025-03-07T23:13:00.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358992025-03-07T23:13:00.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359002025-03-07T23:13:00.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
359012025-03-07T23:13:00.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
359022025-03-07T23:13:00.443ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c uri = /v1/instances?project=demo-project
359032025-03-07T23:13:00.443ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database uri = /v1/instances?project=demo-project
359042025-03-07T23:13:00.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359052025-03-07T23:13:00.445ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
359062025-03-07T23:13:00.461ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database uri = /v1/instances?project=demo-project
359072025-03-07T23:13:00.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359082025-03-07T23:13:00.462ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
359092025-03-07T23:13:00.464ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
359102025-03-07T23:13:00.466ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
359112025-03-07T23:13:00.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database uri = /v1/instances?project=demo-project
359122025-03-07T23:13:00.466ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359132025-03-07T23:13:00.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
359142025-03-07T23:13:00.475ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
359152025-03-07T23:13:00.475ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database uri = /v1/instances?project=demo-project
359162025-03-07T23:13:00.475ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359172025-03-07T23:13:00.476ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
359182025-03-07T23:13:00.480ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
359192025-03-07T23:13:00.480ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database uri = /v1/instances?project=demo-project
359202025-03-07T23:13:00.480ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359212025-03-07T23:13:00.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
359222025-03-07T23:13:00.495ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
359232025-03-07T23:13:00.519ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/instances?project=demo-project
359242025-03-07T23:13:00.520ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 157302 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = fcbd5a5d-044f-4072-a3b3-f268c13ada7c response_code = 404 uri = /v1/instances?project=demo-project
359252025-03-07T23:13:00.521ZINFOtest_unauthorized (external client test context): client received response status = 404
359262025-03-07T23:13:00.521ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances?project=demo-project
359272025-03-07T23:13:00.521ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359282025-03-07T23:13:00.522ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d911a0-5a38-4898-9a55-d6772b6f76bf uri = /v1/instances?project=demo-project
359292025-03-07T23:13:00.522ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d911a0-5a38-4898-9a55-d6772b6f76bf uri = /v1/instances?project=demo-project
359302025-03-07T23:13:00.522ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d911a0-5a38-4898-9a55-d6772b6f76bf uri = /v1/instances?project=demo-project
359312025-03-07T23:13:00.523ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d911a0-5a38-4898-9a55-d6772b6f76bf uri = /v1/instances?project=demo-project
359322025-03-07T23:13:00.523ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1283 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d5d911a0-5a38-4898-9a55-d6772b6f76bf response_code = 401 uri = /v1/instances?project=demo-project
359332025-03-07T23:13:00.523ZINFOtest_unauthorized (external client test context): client received response status = 401
359342025-03-07T23:13:00.525ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances?project=demo-project
359352025-03-07T23:13:00.525ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359362025-03-07T23:13:00.526ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aebca55a-654e-4070-86f4-8a8a1fe15679 uri = /v1/instances?project=demo-project
359372025-03-07T23:13:00.531ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aebca55a-654e-4070-86f4-8a8a1fe15679 uri = /v1/instances?project=demo-project
359382025-03-07T23:13:00.531ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aebca55a-654e-4070-86f4-8a8a1fe15679 uri = /v1/instances?project=demo-project
359392025-03-07T23:13:00.531ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 6476 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = aebca55a-654e-4070-86f4-8a8a1fe15679 response_code = 401 uri = /v1/instances?project=demo-project
359402025-03-07T23:13:00.533ZINFOtest_unauthorized (external client test context): client received response status = 401
359412025-03-07T23:13:00.533ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances?project=demo-project
359422025-03-07T23:13:00.533ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359432025-03-07T23:13:00.533ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 213d6644-f12d-4681-8ca3-0100f81cf2cf uri = /v1/instances?project=demo-project
359442025-03-07T23:13:00.534ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 213d6644-f12d-4681-8ca3-0100f81cf2cf uri = /v1/instances?project=demo-project
359452025-03-07T23:13:00.536ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2078:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2094:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 213d6644-f12d-4681-8ca3-0100f81cf2cf uri = /v1/instances?project=demo-project
359462025-03-07T23:13:00.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1889 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 213d6644-f12d-4681-8ca3-0100f81cf2cf response_code = 401 uri = /v1/instances?project=demo-project
359472025-03-07T23:13:00.536ZINFOtest_unauthorized (external client test context): client received response status = 401
359482025-03-07T23:13:00.536ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances?project=demo-project
359492025-03-07T23:13:00.536ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359502025-03-07T23:13:00.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = afd3aa35-448b-411a-9e0f-4fa3cb8a83fc uri = /v1/instances?project=demo-project
359512025-03-07T23:13:00.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 716 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = afd3aa35-448b-411a-9e0f-4fa3cb8a83fc response_code = 405 uri = /v1/instances?project=demo-project
359522025-03-07T23:13:00.536ZINFOtest_unauthorized (external client test context): client received response status = 405
359532025-03-07T23:13:00.537ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances?project=demo-project
359542025-03-07T23:13:00.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359552025-03-07T23:13:00.537ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5469f1c2-85b7-41d5-bca1-8465c2d17be4 uri = /v1/instances?project=demo-project
359562025-03-07T23:13:00.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 195 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5469f1c2-85b7-41d5-bca1-8465c2d17be4 response_code = 405 uri = /v1/instances?project=demo-project
359572025-03-07T23:13:00.538ZINFOtest_unauthorized (external client test context): client received response status = 405
359582025-03-07T23:13:00.538ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances?project=demo-project
359592025-03-07T23:13:00.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359602025-03-07T23:13:00.540ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5b33f20e-0556-4a72-8c27-7acbf95c07d7 uri = /v1/instances?project=demo-project
359612025-03-07T23:13:00.543ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 3320 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 5b33f20e-0556-4a72-8c27-7acbf95c07d7 response_code = 405 uri = /v1/instances?project=demo-project
359622025-03-07T23:13:00.550ZINFOtest_unauthorized (external client test context): client received response status = 405
359632025-03-07T23:13:00.551ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances?project=demo-project
359642025-03-07T23:13:00.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359652025-03-07T23:13:00.551ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e8c791f1-88f8-4c12-881b-d0a26ebc82e7 uri = /v1/instances?project=demo-project
359662025-03-07T23:13:00.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 114 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = e8c791f1-88f8-4c12-881b-d0a26ebc82e7 response_code = 405 uri = /v1/instances?project=demo-project
359672025-03-07T23:13:00.551ZINFOtest_unauthorized (external client test context): client received response status = 405
359682025-03-07T23:13:00.551ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances?project=demo-project
359692025-03-07T23:13:00.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359702025-03-07T23:13:00.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a25af55-b1ad-4433-887b-8d0a1b38eee0 uri = /v1/instances?project=demo-project
359712025-03-07T23:13:00.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a25af55-b1ad-4433-887b-8d0a1b38eee0 response_code = 405 uri = /v1/instances?project=demo-project
359722025-03-07T23:13:00.552ZINFOtest_unauthorized (external client test context): client received response status = 405
359732025-03-07T23:13:00.552ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances?project=demo-project
359742025-03-07T23:13:00.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359752025-03-07T23:13:00.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 34e6f0b2-8c22-4370-bdc0-1d3fdd25f8ad uri = /v1/instances?project=demo-project
359762025-03-07T23:13:00.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 34e6f0b2-8c22-4370-bdc0-1d3fdd25f8ad response_code = 405 uri = /v1/instances?project=demo-project
359772025-03-07T23:13:00.553ZINFOtest_unauthorized (external client test context): client received response status = 405
359782025-03-07T23:13:00.554ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances?project=demo-project
359792025-03-07T23:13:00.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359802025-03-07T23:13:00.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f6cf0c8e-dfd0-4d73-bfd0-947131016f46 uri = /v1/instances?project=demo-project
359812025-03-07T23:13:00.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f6cf0c8e-dfd0-4d73-bfd0-947131016f46 response_code = 405 uri = /v1/instances?project=demo-project
359822025-03-07T23:13:00.554ZINFOtest_unauthorized (external client test context): client received response status = 405
359832025-03-07T23:13:00.554ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances?project=demo-project
359842025-03-07T23:13:00.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359852025-03-07T23:13:00.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4ddd0277-41ea-49d5-a826-d99724e4b20f uri = /v1/instances?project=demo-project
359862025-03-07T23:13:00.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4ddd0277-41ea-49d5-a826-d99724e4b20f response_code = 405 uri = /v1/instances?project=demo-project
359872025-03-07T23:13:00.554ZINFOtest_unauthorized (external client test context): client received response status = 405
359882025-03-07T23:13:00.554ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances?project=demo-project
359892025-03-07T23:13:00.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances?project=demo-project
359902025-03-07T23:13:00.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e uri = /v1/instances?project=demo-project
359912025-03-07T23:13:00.556ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e uri = /v1/instances?project=demo-project
359922025-03-07T23:13:00.556ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
359932025-03-07T23:13:00.556ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359942025-03-07T23:13:00.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359952025-03-07T23:13:00.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359962025-03-07T23:13:00.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359972025-03-07T23:13:00.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359982025-03-07T23:13:00.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359992025-03-07T23:13:00.561ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
360002025-03-07T23:13:00.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
360012025-03-07T23:13:00.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360022025-03-07T23:13:00.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360032025-03-07T23:13:00.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360042025-03-07T23:13:00.573ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
360052025-03-07T23:13:00.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360062025-03-07T23:13:00.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360072025-03-07T23:13:00.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360082025-03-07T23:13:00.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
360092025-03-07T23:13:00.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
360102025-03-07T23:13:00.581ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360112025-03-07T23:13:00.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360122025-03-07T23:13:00.583ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360132025-03-07T23:13:00.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
360142025-03-07T23:13:00.586ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
360152025-03-07T23:13:00.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360162025-03-07T23:13:00.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360172025-03-07T23:13:00.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360182025-03-07T23:13:00.593ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360192025-03-07T23:13:00.594ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360202025-03-07T23:13:00.598ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
360212025-03-07T23:13:00.598ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360222025-03-07T23:13:00.598ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360232025-03-07T23:13:00.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360242025-03-07T23:13:00.612ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360252025-03-07T23:13:00.612ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360262025-03-07T23:13:00.612ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360272025-03-07T23:13:00.612ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
360282025-03-07T23:13:00.615ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
360292025-03-07T23:13:00.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
360302025-03-07T23:13:00.624ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e uri = /v1/instances?project=demo-project
360312025-03-07T23:13:00.624ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360322025-03-07T23:13:00.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360332025-03-07T23:13:00.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360342025-03-07T23:13:00.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360352025-03-07T23:13:00.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360362025-03-07T23:13:00.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360372025-03-07T23:13:00.651ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
360382025-03-07T23:13:00.651ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
360392025-03-07T23:13:00.652ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360402025-03-07T23:13:00.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360412025-03-07T23:13:00.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360422025-03-07T23:13:00.663ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
360432025-03-07T23:13:00.664ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360442025-03-07T23:13:00.664ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360452025-03-07T23:13:00.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360462025-03-07T23:13:00.678ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
360472025-03-07T23:13:00.683ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360482025-03-07T23:13:00.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360492025-03-07T23:13:00.711ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360502025-03-07T23:13:00.722ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
360512025-03-07T23:13:00.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
360522025-03-07T23:13:00.751ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
360532025-03-07T23:13:00.751ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances?project=demo-project
360542025-03-07T23:13:00.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360552025-03-07T23:13:00.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360562025-03-07T23:13:00.768ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360572025-03-07T23:13:00.776ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
360582025-03-07T23:13:00.776ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360592025-03-07T23:13:00.776ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360602025-03-07T23:13:00.777ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360612025-03-07T23:13:00.804ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
360622025-03-07T23:13:00.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360632025-03-07T23:13:00.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360642025-03-07T23:13:00.805ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360652025-03-07T23:13:00.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
360662025-03-07T23:13:00.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
360672025-03-07T23:13:00.839ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database uri = /v1/instances?project=demo-project
360682025-03-07T23:13:00.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
360692025-03-07T23:13:00.840ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
360702025-03-07T23:13:00.851ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 297320 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1475e83e-b60a-4129-8964-2d4f4bf90c5e response_code = 200 uri = /v1/instances?project=demo-project
360712025-03-07T23:13:00.852ZINFOtest_unauthorized (external client test context): client received response status = 200
360722025-03-07T23:13:00.853ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance?project=demo-project
360732025-03-07T23:13:00.853ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance?project=demo-project
360742025-03-07T23:13:00.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
360752025-03-07T23:13:00.853ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 uri = /v1/instances/demo-instance?project=demo-project
360762025-03-07T23:13:00.853ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 uri = /v1/instances/demo-instance?project=demo-project
360772025-03-07T23:13:00.853ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance?project=demo-project
360782025-03-07T23:13:00.853ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360792025-03-07T23:13:00.853ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360802025-03-07T23:13:00.855ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360812025-03-07T23:13:00.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360822025-03-07T23:13:00.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360832025-03-07T23:13:00.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360842025-03-07T23:13:00.879ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
360852025-03-07T23:13:00.879ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
360862025-03-07T23:13:00.880ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360872025-03-07T23:13:00.880ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360882025-03-07T23:13:00.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360892025-03-07T23:13:00.889ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
360902025-03-07T23:13:00.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360912025-03-07T23:13:00.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360922025-03-07T23:13:00.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360932025-03-07T23:13:00.900ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
360942025-03-07T23:13:00.907ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
360952025-03-07T23:13:00.909ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360962025-03-07T23:13:00.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360972025-03-07T23:13:00.910ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360982025-03-07T23:13:00.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
360992025-03-07T23:13:00.914ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361002025-03-07T23:13:00.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361012025-03-07T23:13:00.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361022025-03-07T23:13:00.915ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361032025-03-07T23:13:00.916ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
361042025-03-07T23:13:00.918ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
361052025-03-07T23:13:00.919ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
361062025-03-07T23:13:00.919ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
361072025-03-07T23:13:00.919ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
361082025-03-07T23:13:00.920ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
361092025-03-07T23:13:00.920ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
361102025-03-07T23:13:00.920ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
361112025-03-07T23:13:00.920ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
361122025-03-07T23:13:00.921ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361132025-03-07T23:13:00.921ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361142025-03-07T23:13:00.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361152025-03-07T23:13:00.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361162025-03-07T23:13:00.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
361172025-03-07T23:13:00.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
361182025-03-07T23:13:00.939ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 uri = /v1/instances/demo-instance?project=demo-project
361192025-03-07T23:13:00.940ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361202025-03-07T23:13:00.940ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361212025-03-07T23:13:00.942ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361222025-03-07T23:13:00.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361232025-03-07T23:13:00.947ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361242025-03-07T23:13:00.949ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361252025-03-07T23:13:00.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361262025-03-07T23:13:00.951ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361272025-03-07T23:13:00.965ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361282025-03-07T23:13:00.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
361292025-03-07T23:13:00.973ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
361302025-03-07T23:13:00.973ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361312025-03-07T23:13:00.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361322025-03-07T23:13:00.973ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361332025-03-07T23:13:00.978ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
361342025-03-07T23:13:00.978ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361352025-03-07T23:13:00.978ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361362025-03-07T23:13:00.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361372025-03-07T23:13:00.982ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
361382025-03-07T23:13:00.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361392025-03-07T23:13:00.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361402025-03-07T23:13:00.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361412025-03-07T23:13:00.995ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
361422025-03-07T23:13:01.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361432025-03-07T23:13:01.032ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
361442025-03-07T23:13:01.033ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
361452025-03-07T23:13:01.033ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361462025-03-07T23:13:01.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361472025-03-07T23:13:01.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361482025-03-07T23:13:01.040ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
361492025-03-07T23:13:01.040ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361502025-03-07T23:13:01.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361512025-03-07T23:13:01.042ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361522025-03-07T23:13:01.047ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
361532025-03-07T23:13:01.049ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361542025-03-07T23:13:01.049ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361552025-03-07T23:13:01.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361562025-03-07T23:13:01.056ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
361572025-03-07T23:13:01.079ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361582025-03-07T23:13:01.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database uri = /v1/instances/demo-instance?project=demo-project
361592025-03-07T23:13:01.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
361602025-03-07T23:13:01.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
361612025-03-07T23:13:01.099ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 246428 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 811b770f-3c88-402e-97b7-4a8e9ff094f0 response_code = 200 uri = /v1/instances/demo-instance?project=demo-project
361622025-03-07T23:13:01.100ZINFOtest_unauthorized (external client test context): client received response status = 200
361632025-03-07T23:13:01.100ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance?project=demo-project
361642025-03-07T23:13:01.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
361652025-03-07T23:13:01.100ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b uri = /v1/instances/demo-instance?project=demo-project
361662025-03-07T23:13:01.101ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b uri = /v1/instances/demo-instance?project=demo-project
361672025-03-07T23:13:01.101ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
361682025-03-07T23:13:01.101ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361692025-03-07T23:13:01.101ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361702025-03-07T23:13:01.102ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361712025-03-07T23:13:01.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361722025-03-07T23:13:01.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361732025-03-07T23:13:01.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361742025-03-07T23:13:01.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
361752025-03-07T23:13:01.129ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361762025-03-07T23:13:01.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361772025-03-07T23:13:01.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361782025-03-07T23:13:01.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361792025-03-07T23:13:01.134ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361802025-03-07T23:13:01.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361812025-03-07T23:13:01.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361822025-03-07T23:13:01.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361832025-03-07T23:13:01.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
361842025-03-07T23:13:01.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
361852025-03-07T23:13:01.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361862025-03-07T23:13:01.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361872025-03-07T23:13:01.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361882025-03-07T23:13:01.146ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
361892025-03-07T23:13:01.146ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361902025-03-07T23:13:01.146ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361912025-03-07T23:13:01.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361922025-03-07T23:13:01.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361932025-03-07T23:13:01.149ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361942025-03-07T23:13:01.150ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361952025-03-07T23:13:01.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361962025-03-07T23:13:01.161ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361972025-03-07T23:13:01.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
361982025-03-07T23:13:01.172ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
361992025-03-07T23:13:01.173ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b uri = /v1/instances/demo-instance?project=demo-project
362002025-03-07T23:13:01.174ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362012025-03-07T23:13:01.174ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362022025-03-07T23:13:01.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362032025-03-07T23:13:01.187ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362042025-03-07T23:13:01.187ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362052025-03-07T23:13:01.188ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362062025-03-07T23:13:01.190ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362072025-03-07T23:13:01.190ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362082025-03-07T23:13:01.191ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362092025-03-07T23:13:01.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
362102025-03-07T23:13:01.198ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
362112025-03-07T23:13:01.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362122025-03-07T23:13:01.198ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362132025-03-07T23:13:01.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362142025-03-07T23:13:01.215ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
362152025-03-07T23:13:01.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362162025-03-07T23:13:01.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362172025-03-07T23:13:01.219ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362182025-03-07T23:13:01.219ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
362192025-03-07T23:13:01.220ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
362202025-03-07T23:13:01.220ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
362212025-03-07T23:13:01.220ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
362222025-03-07T23:13:01.223ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
362232025-03-07T23:13:01.223ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
362242025-03-07T23:13:01.223ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
362252025-03-07T23:13:01.224ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database uri = /v1/instances/demo-instance?project=demo-project
362262025-03-07T23:13:01.226ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362272025-03-07T23:13:01.226ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362282025-03-07T23:13:01.228ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
362292025-03-07T23:13:01.228ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
362302025-03-07T23:13:01.235ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362312025-03-07T23:13:01.252ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
362322025-03-07T23:13:01.253ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 152267 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f20c9c27-b925-4f87-88ce-2041e781088b response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
362332025-03-07T23:13:01.253ZINFOtest_unauthorized (external client test context): client received response status = 404
362342025-03-07T23:13:01.254ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance?project=demo-project
362352025-03-07T23:13:01.256ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
362362025-03-07T23:13:01.257ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acd9ede5-8643-43f7-8c4f-0bd10fa0542b uri = /v1/instances/demo-instance?project=demo-project
362372025-03-07T23:13:01.257ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acd9ede5-8643-43f7-8c4f-0bd10fa0542b uri = /v1/instances/demo-instance?project=demo-project
362382025-03-07T23:13:01.257ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acd9ede5-8643-43f7-8c4f-0bd10fa0542b uri = /v1/instances/demo-instance?project=demo-project
362392025-03-07T23:13:01.257ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acd9ede5-8643-43f7-8c4f-0bd10fa0542b uri = /v1/instances/demo-instance?project=demo-project
362402025-03-07T23:13:01.257ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 871 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = acd9ede5-8643-43f7-8c4f-0bd10fa0542b response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
362412025-03-07T23:13:01.258ZINFOtest_unauthorized (external client test context): client received response status = 401
362422025-03-07T23:13:01.258ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance?project=demo-project
362432025-03-07T23:13:01.258ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
362442025-03-07T23:13:01.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80b4f4ad-0f7a-43a4-b9f6-baac7b902b9c uri = /v1/instances/demo-instance?project=demo-project
362452025-03-07T23:13:01.259ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80b4f4ad-0f7a-43a4-b9f6-baac7b902b9c uri = /v1/instances/demo-instance?project=demo-project
362462025-03-07T23:13:01.259ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80b4f4ad-0f7a-43a4-b9f6-baac7b902b9c uri = /v1/instances/demo-instance?project=demo-project
362472025-03-07T23:13:01.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 639 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 80b4f4ad-0f7a-43a4-b9f6-baac7b902b9c response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
362482025-03-07T23:13:01.259ZINFOtest_unauthorized (external client test context): client received response status = 401
362492025-03-07T23:13:01.260ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance?project=demo-project
362502025-03-07T23:13:01.260ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
362512025-03-07T23:13:01.260ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3f4faf9e-eadd-4729-9fbd-ed7fd45aca60 uri = /v1/instances/demo-instance?project=demo-project
362522025-03-07T23:13:01.260ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3f4faf9e-eadd-4729-9fbd-ed7fd45aca60 uri = /v1/instances/demo-instance?project=demo-project
362532025-03-07T23:13:01.262ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2108:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2127:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3f4faf9e-eadd-4729-9fbd-ed7fd45aca60 uri = /v1/instances/demo-instance?project=demo-project
362542025-03-07T23:13:01.263ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3020 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 3f4faf9e-eadd-4729-9fbd-ed7fd45aca60 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
362552025-03-07T23:13:01.264ZINFOtest_unauthorized (external client test context): client received response status = 401
362562025-03-07T23:13:01.265ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance?project=demo-project
362572025-03-07T23:13:01.265ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
362582025-03-07T23:13:01.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 uri = /v1/instances/demo-instance?project=demo-project
362592025-03-07T23:13:01.266ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 uri = /v1/instances/demo-instance?project=demo-project
362602025-03-07T23:13:01.267ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
362612025-03-07T23:13:01.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362622025-03-07T23:13:01.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362632025-03-07T23:13:01.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362642025-03-07T23:13:01.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362652025-03-07T23:13:01.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362662025-03-07T23:13:01.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362672025-03-07T23:13:01.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
362682025-03-07T23:13:01.293ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
362692025-03-07T23:13:01.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362702025-03-07T23:13:01.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362712025-03-07T23:13:01.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362722025-03-07T23:13:01.297ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
362732025-03-07T23:13:01.297ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362742025-03-07T23:13:01.297ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362752025-03-07T23:13:01.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362762025-03-07T23:13:01.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
362772025-03-07T23:13:01.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
362782025-03-07T23:13:01.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362792025-03-07T23:13:01.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362802025-03-07T23:13:01.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362812025-03-07T23:13:01.323ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
362822025-03-07T23:13:01.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
362832025-03-07T23:13:01.327ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
362842025-03-07T23:13:01.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362852025-03-07T23:13:01.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362862025-03-07T23:13:01.330ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362872025-03-07T23:13:01.333ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
362882025-03-07T23:13:01.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362892025-03-07T23:13:01.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362902025-03-07T23:13:01.335ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362912025-03-07T23:13:01.337ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
362922025-03-07T23:13:01.343ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
362932025-03-07T23:13:01.344ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 uri = /v1/instances/demo-instance?project=demo-project
362942025-03-07T23:13:01.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
362952025-03-07T23:13:01.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362962025-03-07T23:13:01.344ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
362972025-03-07T23:13:01.347ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
362982025-03-07T23:13:01.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
362992025-03-07T23:13:01.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
363002025-03-07T23:13:01.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
363012025-03-07T23:13:01.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
363022025-03-07T23:13:01.366ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
363032025-03-07T23:13:01.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
363042025-03-07T23:13:01.376ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
363052025-03-07T23:13:01.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
363062025-03-07T23:13:01.376ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
363072025-03-07T23:13:01.378ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
363082025-03-07T23:13:01.382ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
363092025-03-07T23:13:01.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
363102025-03-07T23:13:01.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
363112025-03-07T23:13:01.385ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
363122025-03-07T23:13:01.388ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
363132025-03-07T23:13:01.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database uri = /v1/instances/demo-instance?project=demo-project
363142025-03-07T23:13:01.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
363152025-03-07T23:13:01.391ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
363162025-03-07T23:13:01.397ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
363172025-03-07T23:13:01.441ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
363182025-03-07T23:13:01.441ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 175341 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 38b88d09-8140-4552-bb44-75c941ae7673 response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
363192025-03-07T23:13:01.442ZINFOtest_unauthorized (external client test context): client received response status = 404
363202025-03-07T23:13:01.442ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance?project=demo-project
363212025-03-07T23:13:01.442ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363222025-03-07T23:13:01.443ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdece5e0-8b0f-4613-8f00-7e7412f49e84 uri = /v1/instances/demo-instance?project=demo-project
363232025-03-07T23:13:01.443ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdece5e0-8b0f-4613-8f00-7e7412f49e84 uri = /v1/instances/demo-instance?project=demo-project
363242025-03-07T23:13:01.443ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdece5e0-8b0f-4613-8f00-7e7412f49e84 uri = /v1/instances/demo-instance?project=demo-project
363252025-03-07T23:13:01.444ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdece5e0-8b0f-4613-8f00-7e7412f49e84 uri = /v1/instances/demo-instance?project=demo-project
363262025-03-07T23:13:01.444ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 492 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdece5e0-8b0f-4613-8f00-7e7412f49e84 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
363272025-03-07T23:13:01.444ZINFOtest_unauthorized (external client test context): client received response status = 401
363282025-03-07T23:13:01.444ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance?project=demo-project
363292025-03-07T23:13:01.444ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363302025-03-07T23:13:01.444ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4c7262b5-1655-4e5c-b32e-abb39a41211f uri = /v1/instances/demo-instance?project=demo-project
363312025-03-07T23:13:01.445ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4c7262b5-1655-4e5c-b32e-abb39a41211f uri = /v1/instances/demo-instance?project=demo-project
363322025-03-07T23:13:01.446ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4c7262b5-1655-4e5c-b32e-abb39a41211f uri = /v1/instances/demo-instance?project=demo-project
363332025-03-07T23:13:01.446ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 347 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 4c7262b5-1655-4e5c-b32e-abb39a41211f response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
363342025-03-07T23:13:01.446ZINFOtest_unauthorized (external client test context): client received response status = 401
363352025-03-07T23:13:01.446ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance?project=demo-project
363362025-03-07T23:13:01.446ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363372025-03-07T23:13:01.446ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 353918fd-733f-4ed6-ad34-45a196deda05 uri = /v1/instances/demo-instance?project=demo-project
363382025-03-07T23:13:01.446ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 353918fd-733f-4ed6-ad34-45a196deda05 uri = /v1/instances/demo-instance?project=demo-project
363392025-03-07T23:13:01.447ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2175:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2191:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 353918fd-733f-4ed6-ad34-45a196deda05 uri = /v1/instances/demo-instance?project=demo-project
363402025-03-07T23:13:01.447ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1450 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 353918fd-733f-4ed6-ad34-45a196deda05 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
363412025-03-07T23:13:01.447ZINFOtest_unauthorized (external client test context): client received response status = 401
363422025-03-07T23:13:01.447ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance?project=demo-project
363432025-03-07T23:13:01.448ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363442025-03-07T23:13:01.448ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 638c24a3-6c65-446e-a517-c18e5a0fd039 uri = /v1/instances/demo-instance?project=demo-project
363452025-03-07T23:13:01.448ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 197 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 638c24a3-6c65-446e-a517-c18e5a0fd039 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
363462025-03-07T23:13:01.449ZINFOtest_unauthorized (external client test context): client received response status = 405
363472025-03-07T23:13:01.450ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance?project=demo-project
363482025-03-07T23:13:01.450ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363492025-03-07T23:13:01.450ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5f8c129a-14a5-4e8f-9b15-bc512ab119e1 uri = /v1/instances/demo-instance?project=demo-project
363502025-03-07T23:13:01.450ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 5f8c129a-14a5-4e8f-9b15-bc512ab119e1 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
363512025-03-07T23:13:01.450ZINFOtest_unauthorized (external client test context): client received response status = 405
363522025-03-07T23:13:01.450ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance?project=demo-project
363532025-03-07T23:13:01.450ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363542025-03-07T23:13:01.450ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3f4b597-b999-4142-a97a-7ecadfc6b97c uri = /v1/instances/demo-instance?project=demo-project
363552025-03-07T23:13:01.450ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = f3f4b597-b999-4142-a97a-7ecadfc6b97c response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
363562025-03-07T23:13:01.451ZINFOtest_unauthorized (external client test context): client received response status = 405
363572025-03-07T23:13:01.453ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance?project=demo-project
363582025-03-07T23:13:01.453ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363592025-03-07T23:13:01.453ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d04236e0-4aea-4e24-b886-9477e8ccaebf uri = /v1/instances/demo-instance?project=demo-project
363602025-03-07T23:13:01.453ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 251 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d04236e0-4aea-4e24-b886-9477e8ccaebf response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
363612025-03-07T23:13:01.453ZINFOtest_unauthorized (external client test context): client received response status = 405
363622025-03-07T23:13:01.454ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance?project=demo-project
363632025-03-07T23:13:01.454ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
363642025-03-07T23:13:01.454ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 uri = /v1/instances/demo-instance?project=demo-project
363652025-03-07T23:13:01.454ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 uri = /v1/instances/demo-instance?project=demo-project
363662025-03-07T23:13:01.454ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
363672025-03-07T23:13:01.454ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363682025-03-07T23:13:01.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363692025-03-07T23:13:01.455ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363702025-03-07T23:13:01.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363712025-03-07T23:13:01.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363722025-03-07T23:13:01.458ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363732025-03-07T23:13:01.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
363742025-03-07T23:13:01.465ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
363752025-03-07T23:13:01.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363762025-03-07T23:13:01.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363772025-03-07T23:13:01.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363782025-03-07T23:13:01.477ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
363792025-03-07T23:13:01.477ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363802025-03-07T23:13:01.477ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363812025-03-07T23:13:01.477ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363822025-03-07T23:13:01.482ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
363832025-03-07T23:13:01.489ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
363842025-03-07T23:13:01.491ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363852025-03-07T23:13:01.492ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363862025-03-07T23:13:01.493ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363872025-03-07T23:13:01.499ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
363882025-03-07T23:13:01.501ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
363892025-03-07T23:13:01.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363902025-03-07T23:13:01.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363912025-03-07T23:13:01.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363922025-03-07T23:13:01.507ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
363932025-03-07T23:13:01.507ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363942025-03-07T23:13:01.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363952025-03-07T23:13:01.508ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363962025-03-07T23:13:01.515ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
363972025-03-07T23:13:01.522ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
363982025-03-07T23:13:01.523ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 uri = /v1/instances/demo-instance?project=demo-project
363992025-03-07T23:13:01.523ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364002025-03-07T23:13:01.523ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364012025-03-07T23:13:01.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364022025-03-07T23:13:01.525ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364032025-03-07T23:13:01.525ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364042025-03-07T23:13:01.530ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364052025-03-07T23:13:01.547ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364062025-03-07T23:13:01.547ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364072025-03-07T23:13:01.548ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364082025-03-07T23:13:01.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
364092025-03-07T23:13:01.553ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
364102025-03-07T23:13:01.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364112025-03-07T23:13:01.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364122025-03-07T23:13:01.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364132025-03-07T23:13:01.561ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
364142025-03-07T23:13:01.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364152025-03-07T23:13:01.563ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364162025-03-07T23:13:01.563ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364172025-03-07T23:13:01.567ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
364182025-03-07T23:13:01.567ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database uri = /v1/instances/demo-instance?project=demo-project
364192025-03-07T23:13:01.567ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364202025-03-07T23:13:01.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
364212025-03-07T23:13:01.574ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
364222025-03-07T23:13:01.574ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364232025-03-07T23:13:01.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
364242025-03-07T23:13:01.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
364252025-03-07T23:13:01.600ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 148527 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f179dbea-1a50-4898-9102-88f71348b476 response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
364262025-03-07T23:13:01.601ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 52942aab-831c-446c-b477-57f7150804b4 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364272025-03-07T23:13:01.603ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364282025-03-07T23:13:01.603ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 52942aab-831c-446c-b477-57f7150804b4 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364292025-03-07T23:13:01.603ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 52942aab-831c-446c-b477-57f7150804b4 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364302025-03-07T23:13:01.603ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 52942aab-831c-446c-b477-57f7150804b4 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364312025-03-07T23:13:01.603ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364322025-03-07T23:13:01.609ZINFOtest_unauthorized (external client test context): client received response status = 404
364332025-03-07T23:13:01.610ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance?project=demo-project
364342025-03-07T23:13:01.610ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364352025-03-07T23:13:01.615ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12072 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 52942aab-831c-446c-b477-57f7150804b4 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
364362025-03-07T23:13:01.615ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f3c59d72-49cc-4d5f-a4b6-e9c69641fbe9 uri = /v1/instances/demo-instance?project=demo-project
364372025-03-07T23:13:01.615ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f3c59d72-49cc-4d5f-a4b6-e9c69641fbe9 uri = /v1/instances/demo-instance?project=demo-project
364382025-03-07T23:13:01.615ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f3c59d72-49cc-4d5f-a4b6-e9c69641fbe9 uri = /v1/instances/demo-instance?project=demo-project
364392025-03-07T23:13:01.615ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f3c59d72-49cc-4d5f-a4b6-e9c69641fbe9 uri = /v1/instances/demo-instance?project=demo-project
364402025-03-07T23:13:01.615ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364412025-03-07T23:13:01.615ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364422025-03-07T23:13:01.615ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364432025-03-07T23:13:01.615ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364442025-03-07T23:13:01.615ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "52942aab-831c-446c-b477-57f7150804b4", "content-length": "405", "date": "Fri, 07 Mar 2025 23:13:01 GMT"} })
364452025-03-07T23:13:01.621ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364462025-03-07T23:13:01.621ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 3666 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = f3c59d72-49cc-4d5f-a4b6-e9c69641fbe9 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
364472025-03-07T23:13:01.621ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae524b5-3d7a-4bc8-b541-6847d375cfa2 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364482025-03-07T23:13:01.621ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae524b5-3d7a-4bc8-b541-6847d375cfa2 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364492025-03-07T23:13:01.621ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae524b5-3d7a-4bc8-b541-6847d375cfa2 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364502025-03-07T23:13:01.621ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae524b5-3d7a-4bc8-b541-6847d375cfa2 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364512025-03-07T23:13:01.621ZINFOtest_unauthorized (external client test context): client received response status = 401
364522025-03-07T23:13:01.622ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance?project=demo-project
364532025-03-07T23:13:01.622ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364542025-03-07T23:13:01.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2f81965d-a755-4196-b00a-f74689f8102c uri = /v1/instances/demo-instance?project=demo-project
364552025-03-07T23:13:01.622ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2f81965d-a755-4196-b00a-f74689f8102c uri = /v1/instances/demo-instance?project=demo-project
364562025-03-07T23:13:01.622ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2f81965d-a755-4196-b00a-f74689f8102c uri = /v1/instances/demo-instance?project=demo-project
364572025-03-07T23:13:01.622ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 315 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2f81965d-a755-4196-b00a-f74689f8102c response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
364582025-03-07T23:13:01.625ZINFOtest_unauthorized (external client test context): client received response status = 401
364592025-03-07T23:13:01.625ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance?project=demo-project
364602025-03-07T23:13:01.625ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364612025-03-07T23:13:01.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a785c219-6406-4d8d-ab62-686b1a8c9a1a uri = /v1/instances/demo-instance?project=demo-project
364622025-03-07T23:13:01.627ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a785c219-6406-4d8d-ab62-686b1a8c9a1a uri = /v1/instances/demo-instance?project=demo-project
364632025-03-07T23:13:01.629ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2145:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2155:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a785c219-6406-4d8d-ab62-686b1a8c9a1a uri = /v1/instances/demo-instance?project=demo-project
364642025-03-07T23:13:01.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 4363 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a785c219-6406-4d8d-ab62-686b1a8c9a1a response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
364652025-03-07T23:13:01.631ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12742 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = cae524b5-3d7a-4bc8-b541-6847d375cfa2 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
364662025-03-07T23:13:01.631ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "cae524b5-3d7a-4bc8-b541-6847d375cfa2", "content-length": "29", "date": "Fri, 07 Mar 2025 23:13:01 GMT"} })
364672025-03-07T23:13:01.631ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
364682025-03-07T23:13:01.631ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
364692025-03-07T23:13:01.631ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
364702025-03-07T23:13:01.632ZINFOtest_unauthorized (external client test context): client received response status = 401
364712025-03-07T23:13:01.633ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance?project=demo-project
364722025-03-07T23:13:01.633ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364732025-03-07T23:13:01.633ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 264436de-bab8-40fb-b572-97cc91444b09 uri = /v1/instances/demo-instance?project=demo-project
364742025-03-07T23:13:01.633ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 264436de-bab8-40fb-b572-97cc91444b09 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
364752025-03-07T23:13:01.636ZINFOtest_unauthorized (external client test context): client received response status = 405
364762025-03-07T23:13:01.638ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance?project=demo-project
364772025-03-07T23:13:01.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364782025-03-07T23:13:01.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f3c8a69-530b-4696-b04d-2d88d2404f05 uri = /v1/instances/demo-instance?project=demo-project
364792025-03-07T23:13:01.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 7f3c8a69-530b-4696-b04d-2d88d2404f05 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
364802025-03-07T23:13:01.638ZINFOtest_unauthorized (external client test context): client received response status = 405
364812025-03-07T23:13:01.638ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance?project=demo-project
364822025-03-07T23:13:01.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364832025-03-07T23:13:01.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a208350-ccf6-4163-985a-af4dea2c8838 uri = /v1/instances/demo-instance?project=demo-project
364842025-03-07T23:13:01.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 3a208350-ccf6-4163-985a-af4dea2c8838 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
364852025-03-07T23:13:01.638ZINFOtest_unauthorized (external client test context): client received response status = 405
364862025-03-07T23:13:01.638ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance?project=demo-project
364872025-03-07T23:13:01.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364882025-03-07T23:13:01.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a8b06de-6349-44da-a3b1-f4d6f31f083d uri = /v1/instances/demo-instance?project=demo-project
364892025-03-07T23:13:01.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 4a8b06de-6349-44da-a3b1-f4d6f31f083d response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
364902025-03-07T23:13:01.639ZINFOtest_unauthorized (external client test context): client received response status = 405
364912025-03-07T23:13:01.639ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance?project=demo-project
364922025-03-07T23:13:01.639ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance?project=demo-project
364932025-03-07T23:13:01.639ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe uri = /v1/instances/demo-instance?project=demo-project
364942025-03-07T23:13:01.640ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe uri = /v1/instances/demo-instance?project=demo-project
364952025-03-07T23:13:01.640ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance?project=demo-project
364962025-03-07T23:13:01.640ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364972025-03-07T23:13:01.640ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364982025-03-07T23:13:01.640ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364992025-03-07T23:13:01.640ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365002025-03-07T23:13:01.640ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365012025-03-07T23:13:01.640ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365022025-03-07T23:13:01.659ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
365032025-03-07T23:13:01.659ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365042025-03-07T23:13:01.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365052025-03-07T23:13:01.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365062025-03-07T23:13:01.662ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365072025-03-07T23:13:01.673ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
365082025-03-07T23:13:01.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365092025-03-07T23:13:01.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365102025-03-07T23:13:01.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365112025-03-07T23:13:01.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
365122025-03-07T23:13:01.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
365132025-03-07T23:13:01.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365142025-03-07T23:13:01.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365152025-03-07T23:13:01.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365162025-03-07T23:13:01.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
365172025-03-07T23:13:01.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365182025-03-07T23:13:01.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365192025-03-07T23:13:01.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365202025-03-07T23:13:01.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365212025-03-07T23:13:01.705ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
365222025-03-07T23:13:01.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365232025-03-07T23:13:01.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365242025-03-07T23:13:01.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365252025-03-07T23:13:01.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
365262025-03-07T23:13:01.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
365272025-03-07T23:13:01.721ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe uri = /v1/instances/demo-instance?project=demo-project
365282025-03-07T23:13:01.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365292025-03-07T23:13:01.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365302025-03-07T23:13:01.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365312025-03-07T23:13:01.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365322025-03-07T23:13:01.727ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365332025-03-07T23:13:01.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365342025-03-07T23:13:01.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365352025-03-07T23:13:01.738ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365362025-03-07T23:13:01.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365372025-03-07T23:13:01.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
365382025-03-07T23:13:01.741ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
365392025-03-07T23:13:01.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365402025-03-07T23:13:01.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365412025-03-07T23:13:01.746ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365422025-03-07T23:13:01.753ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
365432025-03-07T23:13:01.759ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365442025-03-07T23:13:01.759ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365452025-03-07T23:13:01.759ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365462025-03-07T23:13:01.767ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
365472025-03-07T23:13:01.767ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365482025-03-07T23:13:01.767ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365492025-03-07T23:13:01.767ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365502025-03-07T23:13:01.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
365512025-03-07T23:13:01.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365522025-03-07T23:13:01.820ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
365532025-03-07T23:13:01.820ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
365542025-03-07T23:13:01.820ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365552025-03-07T23:13:01.820ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365562025-03-07T23:13:01.820ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365572025-03-07T23:13:01.829ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
365582025-03-07T23:13:01.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365592025-03-07T23:13:01.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365602025-03-07T23:13:01.833ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365612025-03-07T23:13:01.836ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
365622025-03-07T23:13:01.836ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365632025-03-07T23:13:01.836ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365642025-03-07T23:13:01.837ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365652025-03-07T23:13:01.841ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
365662025-03-07T23:13:01.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365672025-03-07T23:13:01.869ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database uri = /v1/instances/demo-instance?project=demo-project
365682025-03-07T23:13:01.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365692025-03-07T23:13:01.871ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365702025-03-07T23:13:01.876ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 241515 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 1c0c680e-3db0-4ed4-8797-0b14aa011cfe response_code = 200 uri = /v1/instances/demo-instance?project=demo-project
365712025-03-07T23:13:01.879ZINFOtest_unauthorized (external client test context): client received response status = 200
365722025-03-07T23:13:01.879ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/start?project=demo-project
365732025-03-07T23:13:01.879ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/start?project=demo-project
365742025-03-07T23:13:01.879ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/start?project=demo-project
365752025-03-07T23:13:01.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
365762025-03-07T23:13:01.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63938080-449d-4735-a48b-56715d8918aa uri = /v1/instances/demo-instance/start?project=demo-project
365772025-03-07T23:13:01.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 138 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 63938080-449d-4735-a48b-56715d8918aa response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
365782025-03-07T23:13:01.881ZINFOtest_unauthorized (external client test context): client received response status = 405
365792025-03-07T23:13:01.881ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/start?project=demo-project
365802025-03-07T23:13:01.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
365812025-03-07T23:13:01.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 40842153-b86f-46f6-a074-5f3226eec87b uri = /v1/instances/demo-instance/start?project=demo-project
365822025-03-07T23:13:01.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 40842153-b86f-46f6-a074-5f3226eec87b response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
365832025-03-07T23:13:01.881ZINFOtest_unauthorized (external client test context): client received response status = 405
365842025-03-07T23:13:01.881ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/start?project=demo-project
365852025-03-07T23:13:01.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
365862025-03-07T23:13:01.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 25f92929-a778-4452-a2c4-c76598504d6b uri = /v1/instances/demo-instance/start?project=demo-project
365872025-03-07T23:13:01.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 25f92929-a778-4452-a2c4-c76598504d6b response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
365882025-03-07T23:13:01.882ZINFOtest_unauthorized (external client test context): client received response status = 405
365892025-03-07T23:13:01.883ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/start?project=demo-project
365902025-03-07T23:13:01.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
365912025-03-07T23:13:01.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 738022d2-a017-4e7d-b3f0-e4ea83d2bf1b uri = /v1/instances/demo-instance/start?project=demo-project
365922025-03-07T23:13:01.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 738022d2-a017-4e7d-b3f0-e4ea83d2bf1b response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
365932025-03-07T23:13:01.883ZINFOtest_unauthorized (external client test context): client received response status = 405
365942025-03-07T23:13:01.883ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/start?project=demo-project
365952025-03-07T23:13:01.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
365962025-03-07T23:13:01.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ead90942-76ee-4cb8-b9ef-f6927ae3c445 uri = /v1/instances/demo-instance/start?project=demo-project
365972025-03-07T23:13:01.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = ead90942-76ee-4cb8-b9ef-f6927ae3c445 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
365982025-03-07T23:13:01.884ZINFOtest_unauthorized (external client test context): client received response status = 405
365992025-03-07T23:13:01.884ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/start?project=demo-project
366002025-03-07T23:13:01.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366012025-03-07T23:13:01.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3aa23e98-12e0-4180-991b-10261f7374d8 uri = /v1/instances/demo-instance/start?project=demo-project
366022025-03-07T23:13:01.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 3aa23e98-12e0-4180-991b-10261f7374d8 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
366032025-03-07T23:13:01.885ZINFOtest_unauthorized (external client test context): client received response status = 405
366042025-03-07T23:13:01.885ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/start?project=demo-project
366052025-03-07T23:13:01.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366062025-03-07T23:13:01.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 107201e7-fe92-47ef-8c4b-279c6fb86faa uri = /v1/instances/demo-instance/start?project=demo-project
366072025-03-07T23:13:01.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 107201e7-fe92-47ef-8c4b-279c6fb86faa response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
366082025-03-07T23:13:01.886ZINFOtest_unauthorized (external client test context): client received response status = 405
366092025-03-07T23:13:01.886ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/start?project=demo-project
366102025-03-07T23:13:01.886ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366112025-03-07T23:13:01.886ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a045fb10-2ed7-4274-bfef-ffa9876edac5 uri = /v1/instances/demo-instance/start?project=demo-project
366122025-03-07T23:13:01.886ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = a045fb10-2ed7-4274-bfef-ffa9876edac5 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
366132025-03-07T23:13:01.886ZINFOtest_unauthorized (external client test context): client received response status = 405
366142025-03-07T23:13:01.886ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/start?project=demo-project
366152025-03-07T23:13:01.886ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366162025-03-07T23:13:01.886ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 uri = /v1/instances/demo-instance/start?project=demo-project
366172025-03-07T23:13:01.886ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 uri = /v1/instances/demo-instance/start?project=demo-project
366182025-03-07T23:13:01.886ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/start?project=demo-project
366192025-03-07T23:13:01.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366202025-03-07T23:13:01.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366212025-03-07T23:13:01.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366222025-03-07T23:13:01.889ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366232025-03-07T23:13:01.889ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366242025-03-07T23:13:01.890ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366252025-03-07T23:13:01.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
366262025-03-07T23:13:01.892ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
366272025-03-07T23:13:01.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366282025-03-07T23:13:01.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366292025-03-07T23:13:01.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366302025-03-07T23:13:01.897ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
366312025-03-07T23:13:01.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366322025-03-07T23:13:01.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366332025-03-07T23:13:01.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366342025-03-07T23:13:01.906ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
366352025-03-07T23:13:01.913ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
366362025-03-07T23:13:01.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366372025-03-07T23:13:01.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366382025-03-07T23:13:01.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366392025-03-07T23:13:01.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
366402025-03-07T23:13:01.920ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
366412025-03-07T23:13:01.920ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366422025-03-07T23:13:01.920ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366432025-03-07T23:13:01.921ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366442025-03-07T23:13:01.923ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
366452025-03-07T23:13:01.924ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366462025-03-07T23:13:01.924ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366472025-03-07T23:13:01.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366482025-03-07T23:13:01.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
366492025-03-07T23:13:01.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
366502025-03-07T23:13:01.932ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 uri = /v1/instances/demo-instance/start?project=demo-project
366512025-03-07T23:13:01.933ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366522025-03-07T23:13:01.933ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366532025-03-07T23:13:01.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366542025-03-07T23:13:01.937ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366552025-03-07T23:13:01.937ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366562025-03-07T23:13:01.939ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366572025-03-07T23:13:01.941ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366582025-03-07T23:13:01.941ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366592025-03-07T23:13:01.942ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366602025-03-07T23:13:01.944ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/start?project=demo-project
366612025-03-07T23:13:01.946ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/start?project=demo-project
366622025-03-07T23:13:01.946ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366632025-03-07T23:13:01.946ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366642025-03-07T23:13:01.946ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366652025-03-07T23:13:01.949ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/start?project=demo-project
366662025-03-07T23:13:01.950ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366672025-03-07T23:13:01.950ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366682025-03-07T23:13:01.951ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366692025-03-07T23:13:01.966ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/start?project=demo-project
366702025-03-07T23:13:01.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
366712025-03-07T23:13:01.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366722025-03-07T23:13:01.988ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
366732025-03-07T23:13:02.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
366742025-03-07T23:13:02.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/start?project=demo-project
366752025-03-07T23:13:02.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 164120 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 35e6e61c-c2b5-447a-bd07-2e38780487b5 response_code = 404 uri = /v1/instances/demo-instance/start?project=demo-project
366762025-03-07T23:13:02.049ZINFOtest_unauthorized (external client test context): client received response status = 404
366772025-03-07T23:13:02.050ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/start?project=demo-project
366782025-03-07T23:13:02.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366792025-03-07T23:13:02.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8c4cab78-fb89-460c-ae55-81b8afabd8fd uri = /v1/instances/demo-instance/start?project=demo-project
366802025-03-07T23:13:02.051ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8c4cab78-fb89-460c-ae55-81b8afabd8fd uri = /v1/instances/demo-instance/start?project=demo-project
366812025-03-07T23:13:02.051ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8c4cab78-fb89-460c-ae55-81b8afabd8fd uri = /v1/instances/demo-instance/start?project=demo-project
366822025-03-07T23:13:02.052ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8c4cab78-fb89-460c-ae55-81b8afabd8fd uri = /v1/instances/demo-instance/start?project=demo-project
366832025-03-07T23:13:02.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1616 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8c4cab78-fb89-460c-ae55-81b8afabd8fd response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
366842025-03-07T23:13:02.052ZINFOtest_unauthorized (external client test context): client received response status = 401
366852025-03-07T23:13:02.052ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/start?project=demo-project
366862025-03-07T23:13:02.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366872025-03-07T23:13:02.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8138b1ac-9d0f-4707-8ded-a4f98d277300 uri = /v1/instances/demo-instance/start?project=demo-project
366882025-03-07T23:13:02.054ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8138b1ac-9d0f-4707-8ded-a4f98d277300 uri = /v1/instances/demo-instance/start?project=demo-project
366892025-03-07T23:13:02.054ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8138b1ac-9d0f-4707-8ded-a4f98d277300 uri = /v1/instances/demo-instance/start?project=demo-project
366902025-03-07T23:13:02.054ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 316 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8138b1ac-9d0f-4707-8ded-a4f98d277300 response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
366912025-03-07T23:13:02.054ZINFOtest_unauthorized (external client test context): client received response status = 401
366922025-03-07T23:13:02.054ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/start?project=demo-project
366932025-03-07T23:13:02.054ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
366942025-03-07T23:13:02.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3e947de-e2c3-4121-b2a2-61f9fd2f7884 uri = /v1/instances/demo-instance/start?project=demo-project
366952025-03-07T23:13:02.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3e947de-e2c3-4121-b2a2-61f9fd2f7884 uri = /v1/instances/demo-instance/start?project=demo-project
366962025-03-07T23:13:02.060ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2238:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2254:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3e947de-e2c3-4121-b2a2-61f9fd2f7884 uri = /v1/instances/demo-instance/start?project=demo-project
366972025-03-07T23:13:02.060ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3418 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = c3e947de-e2c3-4121-b2a2-61f9fd2f7884 response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
366982025-03-07T23:13:02.062ZINFOtest_unauthorized (external client test context): client received response status = 401
366992025-03-07T23:13:02.063ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
367002025-03-07T23:13:02.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367012025-03-07T23:13:02.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 065a86f5-dab3-4fd0-89ab-ec7000d76922 uri = /v1/instances/demo-instance/start?project=demo-project
367022025-03-07T23:13:02.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 94 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 065a86f5-dab3-4fd0-89ab-ec7000d76922 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367032025-03-07T23:13:02.065ZINFOtest_unauthorized (external client test context): client received response status = 405
367042025-03-07T23:13:02.067ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
367052025-03-07T23:13:02.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367062025-03-07T23:13:02.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2d9eb108-532b-4b63-a00e-5491e937e16d uri = /v1/instances/demo-instance/start?project=demo-project
367072025-03-07T23:13:02.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2d9eb108-532b-4b63-a00e-5491e937e16d response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367082025-03-07T23:13:02.067ZINFOtest_unauthorized (external client test context): client received response status = 405
367092025-03-07T23:13:02.067ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
367102025-03-07T23:13:02.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367112025-03-07T23:13:02.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6200ca41-02fb-4272-b721-45a0e82cfa51 uri = /v1/instances/demo-instance/start?project=demo-project
367122025-03-07T23:13:02.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 6200ca41-02fb-4272-b721-45a0e82cfa51 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367132025-03-07T23:13:02.067ZINFOtest_unauthorized (external client test context): client received response status = 405
367142025-03-07T23:13:02.067ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
367152025-03-07T23:13:02.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367162025-03-07T23:13:02.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 760f5a27-2a07-41a9-bf41-57ab0f67bd50 uri = /v1/instances/demo-instance/start?project=demo-project
367172025-03-07T23:13:02.068ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 760f5a27-2a07-41a9-bf41-57ab0f67bd50 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367182025-03-07T23:13:02.068ZINFOtest_unauthorized (external client test context): client received response status = 405
367192025-03-07T23:13:02.069ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
367202025-03-07T23:13:02.069ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367212025-03-07T23:13:02.069ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c6869f7-1c09-4725-9721-df4b25226087 uri = /v1/instances/demo-instance/start?project=demo-project
367222025-03-07T23:13:02.069ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 0c6869f7-1c09-4725-9721-df4b25226087 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367232025-03-07T23:13:02.069ZINFOtest_unauthorized (external client test context): client received response status = 405
367242025-03-07T23:13:02.069ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
367252025-03-07T23:13:02.069ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367262025-03-07T23:13:02.070ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ae54d6e4-61ba-4dbf-ad83-2b54289482dd uri = /v1/instances/demo-instance/start?project=demo-project
367272025-03-07T23:13:02.072ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 2061 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ae54d6e4-61ba-4dbf-ad83-2b54289482dd response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367282025-03-07T23:13:02.072ZINFOtest_unauthorized (external client test context): client received response status = 405
367292025-03-07T23:13:02.072ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
367302025-03-07T23:13:02.072ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367312025-03-07T23:13:02.072ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9c061bcf-6f29-41e9-af21-48fe7192d4f1 uri = /v1/instances/demo-instance/start?project=demo-project
367322025-03-07T23:13:02.072ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 289 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9c061bcf-6f29-41e9-af21-48fe7192d4f1 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367332025-03-07T23:13:02.073ZINFOtest_unauthorized (external client test context): client received response status = 405
367342025-03-07T23:13:02.073ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
367352025-03-07T23:13:02.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/start?project=demo-project
367362025-03-07T23:13:02.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1836da59-5e9d-4b7f-bc18-d674bbbe097f uri = /v1/instances/demo-instance/start?project=demo-project
367372025-03-07T23:13:02.073ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 98 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 1836da59-5e9d-4b7f-bc18-d674bbbe097f response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
367382025-03-07T23:13:02.073ZINFOtest_unauthorized (external client test context): client received response status = 405
367392025-03-07T23:13:02.073ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/start?project=demo-project
367402025-03-07T23:13:02.075ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/stop?project=demo-project
367412025-03-07T23:13:02.075ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/stop?project=demo-project
367422025-03-07T23:13:02.075ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/stop?project=demo-project
367432025-03-07T23:13:02.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367442025-03-07T23:13:02.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb1cedb8-c7ee-4d56-a6e9-6d27abd4b406 uri = /v1/instances/demo-instance/stop?project=demo-project
367452025-03-07T23:13:02.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = fb1cedb8-c7ee-4d56-a6e9-6d27abd4b406 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367462025-03-07T23:13:02.076ZINFOtest_unauthorized (external client test context): client received response status = 405
367472025-03-07T23:13:02.076ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/stop?project=demo-project
367482025-03-07T23:13:02.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367492025-03-07T23:13:02.076ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 02e11efe-7616-4ef1-965a-2c0890f3089c uri = /v1/instances/demo-instance/stop?project=demo-project
367502025-03-07T23:13:02.081ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1211 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 02e11efe-7616-4ef1-965a-2c0890f3089c response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367512025-03-07T23:13:02.081ZINFOtest_unauthorized (external client test context): client received response status = 405
367522025-03-07T23:13:02.081ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/stop?project=demo-project
367532025-03-07T23:13:02.081ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367542025-03-07T23:13:02.081ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9de9bbbc-9f20-49ac-9df9-3b67351cfd46 uri = /v1/instances/demo-instance/stop?project=demo-project
367552025-03-07T23:13:02.081ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 9de9bbbc-9f20-49ac-9df9-3b67351cfd46 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367562025-03-07T23:13:02.081ZINFOtest_unauthorized (external client test context): client received response status = 405
367572025-03-07T23:13:02.081ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/stop?project=demo-project
367582025-03-07T23:13:02.082ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367592025-03-07T23:13:02.082ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f772823-bd66-4553-9cdc-5c6fe41e97ca uri = /v1/instances/demo-instance/stop?project=demo-project
367602025-03-07T23:13:02.093ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 12078 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 5f772823-bd66-4553-9cdc-5c6fe41e97ca response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367612025-03-07T23:13:02.094ZINFOtest_unauthorized (external client test context): client received response status = 405
367622025-03-07T23:13:02.094ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
367632025-03-07T23:13:02.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367642025-03-07T23:13:02.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = eb67d93f-5050-4965-8520-109514fb6afd uri = /v1/instances/demo-instance/stop?project=demo-project
367652025-03-07T23:13:02.096ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 134 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = eb67d93f-5050-4965-8520-109514fb6afd response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367662025-03-07T23:13:02.096ZINFOtest_unauthorized (external client test context): client received response status = 405
367672025-03-07T23:13:02.099ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
367682025-03-07T23:13:02.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367692025-03-07T23:13:02.100ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 167c1655-2c11-4b32-b983-288a2d355761 uri = /v1/instances/demo-instance/stop?project=demo-project
367702025-03-07T23:13:02.100ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 167c1655-2c11-4b32-b983-288a2d355761 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367712025-03-07T23:13:02.100ZINFOtest_unauthorized (external client test context): client received response status = 405
367722025-03-07T23:13:02.100ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
367732025-03-07T23:13:02.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367742025-03-07T23:13:02.101ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 402fcffc-a22b-4199-9ec1-5aa5e2d74c9a uri = /v1/instances/demo-instance/stop?project=demo-project
367752025-03-07T23:13:02.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1250 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 402fcffc-a22b-4199-9ec1-5aa5e2d74c9a response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367762025-03-07T23:13:02.101ZINFOtest_unauthorized (external client test context): client received response status = 405
367772025-03-07T23:13:02.101ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
367782025-03-07T23:13:02.101ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367792025-03-07T23:13:02.101ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdce3c2d-5f36-41b4-b82c-b96e5b8b08c3 uri = /v1/instances/demo-instance/stop?project=demo-project
367802025-03-07T23:13:02.102ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = cdce3c2d-5f36-41b4-b82c-b96e5b8b08c3 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
367812025-03-07T23:13:02.102ZINFOtest_unauthorized (external client test context): client received response status = 405
367822025-03-07T23:13:02.102ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/stop?project=demo-project
367832025-03-07T23:13:02.102ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
367842025-03-07T23:13:02.102ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 uri = /v1/instances/demo-instance/stop?project=demo-project
367852025-03-07T23:13:02.102ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 uri = /v1/instances/demo-instance/stop?project=demo-project
367862025-03-07T23:13:02.102ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/stop?project=demo-project
367872025-03-07T23:13:02.102ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367882025-03-07T23:13:02.102ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367892025-03-07T23:13:02.106ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367902025-03-07T23:13:02.110ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367912025-03-07T23:13:02.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367922025-03-07T23:13:02.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367932025-03-07T23:13:02.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
367942025-03-07T23:13:02.117ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
367952025-03-07T23:13:02.117ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367962025-03-07T23:13:02.117ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367972025-03-07T23:13:02.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367982025-03-07T23:13:02.120ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
367992025-03-07T23:13:02.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368002025-03-07T23:13:02.122ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368012025-03-07T23:13:02.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368022025-03-07T23:13:02.125ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
368032025-03-07T23:13:02.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
368042025-03-07T23:13:02.133ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368052025-03-07T23:13:02.133ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368062025-03-07T23:13:02.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368072025-03-07T23:13:02.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
368082025-03-07T23:13:02.154ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
368092025-03-07T23:13:02.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368102025-03-07T23:13:02.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368112025-03-07T23:13:02.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368122025-03-07T23:13:02.159ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
368132025-03-07T23:13:02.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368142025-03-07T23:13:02.161ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368152025-03-07T23:13:02.161ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368162025-03-07T23:13:02.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
368172025-03-07T23:13:02.171ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
368182025-03-07T23:13:02.171ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 uri = /v1/instances/demo-instance/stop?project=demo-project
368192025-03-07T23:13:02.171ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368202025-03-07T23:13:02.171ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368212025-03-07T23:13:02.171ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368222025-03-07T23:13:02.174ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368232025-03-07T23:13:02.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368242025-03-07T23:13:02.176ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368252025-03-07T23:13:02.178ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368262025-03-07T23:13:02.178ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368272025-03-07T23:13:02.179ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368282025-03-07T23:13:02.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/stop?project=demo-project
368292025-03-07T23:13:02.195ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/stop?project=demo-project
368302025-03-07T23:13:02.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368312025-03-07T23:13:02.195ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368322025-03-07T23:13:02.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368332025-03-07T23:13:02.200ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/stop?project=demo-project
368342025-03-07T23:13:02.201ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368352025-03-07T23:13:02.201ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368362025-03-07T23:13:02.203ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368372025-03-07T23:13:02.208ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/stop?project=demo-project
368382025-03-07T23:13:02.209ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
368392025-03-07T23:13:02.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368402025-03-07T23:13:02.209ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
368412025-03-07T23:13:02.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
368422025-03-07T23:13:02.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/stop?project=demo-project
368432025-03-07T23:13:02.239ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 137995 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = d822bb93-133f-4139-9cf2-d151c3e9f336 response_code = 404 uri = /v1/instances/demo-instance/stop?project=demo-project
368442025-03-07T23:13:02.240ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
368452025-03-07T23:13:02.240ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
368462025-03-07T23:13:02.241ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
368472025-03-07T23:13:02.242ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
368482025-03-07T23:13:02.243ZINFOtest_unauthorized (external client test context): client received response status = 404
368492025-03-07T23:13:02.244ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/stop?project=demo-project
368502025-03-07T23:13:02.246ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368512025-03-07T23:13:02.246ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 39 56 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 9V..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:59797 req_id = 8d7601ff-7402-4e68-a570-70f3b62893c4
368522025-03-07T23:13:02.247ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 14678,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59797 req_id = 8d7601ff-7402-4e68-a570-70f3b62893c4
368532025-03-07T23:13:02.247ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
368542025-03-07T23:13:02.248ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
368552025-03-07T23:13:02.248ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:59797 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39045, target: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal") })) }] req_id = 8d7601ff-7402-4e68-a570-70f3b62893c4
368562025-03-07T23:13:02.249ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
368572025-03-07T23:13:02.249ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
368582025-03-07T23:13:02.251ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 71d96f2f-dfe9-451d-a970-2d858bdd9be7 uri = /v1/instances/demo-instance/stop?project=demo-project
368592025-03-07T23:13:02.252ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 71d96f2f-dfe9-451d-a970-2d858bdd9be7 uri = /v1/instances/demo-instance/stop?project=demo-project
368602025-03-07T23:13:02.252ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 71d96f2f-dfe9-451d-a970-2d858bdd9be7 uri = /v1/instances/demo-instance/stop?project=demo-project
368612025-03-07T23:13:02.252ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 71d96f2f-dfe9-451d-a970-2d858bdd9be7 uri = /v1/instances/demo-instance/stop?project=demo-project
368622025-03-07T23:13:02.253ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1799 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 71d96f2f-dfe9-451d-a970-2d858bdd9be7 response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
368632025-03-07T23:13:02.255ZINFOtest_unauthorized (external client test context): client received response status = 401
368642025-03-07T23:13:02.255ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/stop?project=demo-project
368652025-03-07T23:13:02.256ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368662025-03-07T23:13:02.256ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
368672025-03-07T23:13:02.256ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
368682025-03-07T23:13:02.257ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 9b a4 01 00 00 01 00 00 00 00 00 01 24 30 65 36 ............$0e6\n0010: 62 62 35 61 38 2d 35 37 35 64 2d 34 39 62 31 2d bb5a8-575d-49b1-\n0020: 61 64 36 39 2d 30 37 61 31 36 64 39 35 32 30 31 ad69-07a16d95201\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:52494 req_id = f7595587-ce56-4a57-a463-974a47ccc92f
368692025-03-07T23:13:02.257ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 39844,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 48,\n 101,\n 54,\n 98,\n 98,\n 53,\n 97,\n 56,\n 45,\n 53,\n 55,\n 53,\n 100,\n 45,\n 52,\n 57,\n 98,\n 49,\n 45,\n 97,\n 100,\n 54,\n 57,\n 45,\n 48,\n 55,\n 97,\n 49,\n 54,\n 100,\n 57,\n 53,\n 50,\n 48,\n 49,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52494 req_id = f7595587-ce56-4a57-a463-974a47ccc92f
368702025-03-07T23:13:02.257ZDEBGtest_unauthorized (store): query key key = 0e6bb5a8-575d-49b1-ad69-07a16d95201a.host
368712025-03-07T23:13:02.257ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:52494 query = LowerQuery { name: LowerName(Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal.")), original: Query { name: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0e6bb5a8-575d-49b1-ad69-07a16d95201a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = f7595587-ce56-4a57-a463-974a47ccc92f
368722025-03-07T23:13:02.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eea2b53b-ab06-46ec-a0d9-c1700f38a34d uri = /v1/instances/demo-instance/stop?project=demo-project
368732025-03-07T23:13:02.259ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eea2b53b-ab06-46ec-a0d9-c1700f38a34d uri = /v1/instances/demo-instance/stop?project=demo-project
368742025-03-07T23:13:02.259ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eea2b53b-ab06-46ec-a0d9-c1700f38a34d uri = /v1/instances/demo-instance/stop?project=demo-project
368752025-03-07T23:13:02.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 815 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = eea2b53b-ab06-46ec-a0d9-c1700f38a34d response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
368762025-03-07T23:13:02.262ZINFOtest_unauthorized (external client test context): client received response status = 401
368772025-03-07T23:13:02.262ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/stop?project=demo-project
368782025-03-07T23:13:02.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368792025-03-07T23:13:02.263ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ce987c3-ba8b-4a13-8243-bbd8894e93ac uri = /v1/instances/demo-instance/stop?project=demo-project
368802025-03-07T23:13:02.263ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ce987c3-ba8b-4a13-8243-bbd8894e93ac uri = /v1/instances/demo-instance/stop?project=demo-project
368812025-03-07T23:13:02.265ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2272:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2283:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ce987c3-ba8b-4a13-8243-bbd8894e93ac uri = /v1/instances/demo-instance/stop?project=demo-project
368822025-03-07T23:13:02.265ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1474 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 4ce987c3-ba8b-4a13-8243-bbd8894e93ac response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
368832025-03-07T23:13:02.265ZINFOtest_unauthorized (external client test context): client received response status = 401
368842025-03-07T23:13:02.265ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
368852025-03-07T23:13:02.265ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368862025-03-07T23:13:02.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 35d9ba86-ce81-43e5-abfc-64dac9845241 uri = /v1/instances/demo-instance/stop?project=demo-project
368872025-03-07T23:13:02.267ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 88 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 35d9ba86-ce81-43e5-abfc-64dac9845241 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
368882025-03-07T23:13:02.268ZINFOtest_unauthorized (external client test context): client received response status = 405
368892025-03-07T23:13:02.268ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
368902025-03-07T23:13:02.268ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368912025-03-07T23:13:02.268ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2323b3c1-3b1d-44d2-bdcc-96b275f5e6b2 uri = /v1/instances/demo-instance/stop?project=demo-project
368922025-03-07T23:13:02.268ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 2323b3c1-3b1d-44d2-bdcc-96b275f5e6b2 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
368932025-03-07T23:13:02.268ZINFOtest_unauthorized (external client test context): client received response status = 405
368942025-03-07T23:13:02.269ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
368952025-03-07T23:13:02.270ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
368962025-03-07T23:13:02.270ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b17d659e-00eb-430b-ae00-53858c593c7c uri = /v1/instances/demo-instance/stop?project=demo-project
368972025-03-07T23:13:02.270ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b17d659e-00eb-430b-ae00-53858c593c7c response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
368982025-03-07T23:13:02.270ZINFOtest_unauthorized (external client test context): client received response status = 405
368992025-03-07T23:13:02.270ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
369002025-03-07T23:13:02.270ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
369012025-03-07T23:13:02.270ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 35bcbd6f-4354-465f-a1fd-13263c7daf53 uri = /v1/instances/demo-instance/stop?project=demo-project
369022025-03-07T23:13:02.270ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 35bcbd6f-4354-465f-a1fd-13263c7daf53 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
369032025-03-07T23:13:02.271ZINFOtest_unauthorized (external client test context): client received response status = 405
369042025-03-07T23:13:02.272ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
369052025-03-07T23:13:02.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
369062025-03-07T23:13:02.272ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 516ce45d-d946-41ad-8f4c-500ae243c985 uri = /v1/instances/demo-instance/stop?project=demo-project
369072025-03-07T23:13:02.272ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 200 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 516ce45d-d946-41ad-8f4c-500ae243c985 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
369082025-03-07T23:13:02.273ZINFOtest_unauthorized (external client test context): client received response status = 405
369092025-03-07T23:13:02.273ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
369102025-03-07T23:13:02.274ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
369112025-03-07T23:13:02.274ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d87b062e-9395-430b-a683-c4741e9d9dcf uri = /v1/instances/demo-instance/stop?project=demo-project
369122025-03-07T23:13:02.275ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 813 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = d87b062e-9395-430b-a683-c4741e9d9dcf response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
369132025-03-07T23:13:02.276ZINFOtest_unauthorized (external client test context): client received response status = 405
369142025-03-07T23:13:02.276ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
369152025-03-07T23:13:02.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
369162025-03-07T23:13:02.276ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9d59b660-2f56-43e3-af50-de5149acf858 uri = /v1/instances/demo-instance/stop?project=demo-project
369172025-03-07T23:13:02.276ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 9d59b660-2f56-43e3-af50-de5149acf858 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
369182025-03-07T23:13:02.277ZINFOtest_unauthorized (external client test context): client received response status = 405
369192025-03-07T23:13:02.278ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
369202025-03-07T23:13:02.278ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/stop?project=demo-project
369212025-03-07T23:13:02.278ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 312f91e1-556c-4b4f-ad20-3a82b1c4268b uri = /v1/instances/demo-instance/stop?project=demo-project
369222025-03-07T23:13:02.278ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 312f91e1-556c-4b4f-ad20-3a82b1c4268b response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
369232025-03-07T23:13:02.278ZINFOtest_unauthorized (external client test context): client received response status = 405
369242025-03-07T23:13:02.279ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/stop?project=demo-project
369252025-03-07T23:13:02.279ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/reboot?project=demo-project
369262025-03-07T23:13:02.279ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/reboot?project=demo-project
369272025-03-07T23:13:02.279ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
369282025-03-07T23:13:02.280ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369292025-03-07T23:13:02.281ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4db3d939-1efe-405a-8776-e349a1ff9b40 uri = /v1/instances/demo-instance/reboot?project=demo-project
369302025-03-07T23:13:02.281ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 199 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4db3d939-1efe-405a-8776-e349a1ff9b40 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369312025-03-07T23:13:02.281ZINFOtest_unauthorized (external client test context): client received response status = 405
369322025-03-07T23:13:02.282ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
369332025-03-07T23:13:02.282ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369342025-03-07T23:13:02.282ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8866a41f-17b8-4992-8571-201bf74828a6 uri = /v1/instances/demo-instance/reboot?project=demo-project
369352025-03-07T23:13:02.282ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 8866a41f-17b8-4992-8571-201bf74828a6 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369362025-03-07T23:13:02.283ZINFOtest_unauthorized (external client test context): client received response status = 405
369372025-03-07T23:13:02.283ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
369382025-03-07T23:13:02.283ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369392025-03-07T23:13:02.285ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6a2f83e-d95e-4361-a25f-ffd48d0fe18e uri = /v1/instances/demo-instance/reboot?project=demo-project
369402025-03-07T23:13:02.285ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 211 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = f6a2f83e-d95e-4361-a25f-ffd48d0fe18e response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369412025-03-07T23:13:02.285ZINFOtest_unauthorized (external client test context): client received response status = 405
369422025-03-07T23:13:02.286ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
369432025-03-07T23:13:02.286ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369442025-03-07T23:13:02.286ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4403a7cd-9576-43a4-8036-83e55f33767c uri = /v1/instances/demo-instance/reboot?project=demo-project
369452025-03-07T23:13:02.286ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 4403a7cd-9576-43a4-8036-83e55f33767c response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369462025-03-07T23:13:02.287ZINFOtest_unauthorized (external client test context): client received response status = 405
369472025-03-07T23:13:02.287ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
369482025-03-07T23:13:02.289ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369492025-03-07T23:13:02.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0c54f1f2-b7cb-4ddb-8839-d09548cf364c uri = /v1/instances/demo-instance/reboot?project=demo-project
369502025-03-07T23:13:02.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 0c54f1f2-b7cb-4ddb-8839-d09548cf364c response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369512025-03-07T23:13:02.291ZINFOtest_unauthorized (external client test context): client received response status = 405
369522025-03-07T23:13:02.291ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
369532025-03-07T23:13:02.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369542025-03-07T23:13:02.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = af79f748-b835-4197-9f99-2b32a461da17 uri = /v1/instances/demo-instance/reboot?project=demo-project
369552025-03-07T23:13:02.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = af79f748-b835-4197-9f99-2b32a461da17 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369562025-03-07T23:13:02.291ZINFOtest_unauthorized (external client test context): client received response status = 405
369572025-03-07T23:13:02.291ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
369582025-03-07T23:13:02.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369592025-03-07T23:13:02.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d38ba57e-165d-4612-b3a5-d93fb6d3828e uri = /v1/instances/demo-instance/reboot?project=demo-project
369602025-03-07T23:13:02.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d38ba57e-165d-4612-b3a5-d93fb6d3828e response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369612025-03-07T23:13:02.291ZINFOtest_unauthorized (external client test context): client received response status = 405
369622025-03-07T23:13:02.292ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
369632025-03-07T23:13:02.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369642025-03-07T23:13:02.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 22cfc240-7db0-40bb-9f8e-c964b69a3a7b uri = /v1/instances/demo-instance/reboot?project=demo-project
369652025-03-07T23:13:02.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 22cfc240-7db0-40bb-9f8e-c964b69a3a7b response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
369662025-03-07T23:13:02.293ZINFOtest_unauthorized (external client test context): client received response status = 405
369672025-03-07T23:13:02.293ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
369682025-03-07T23:13:02.295ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
369692025-03-07T23:13:02.295ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 uri = /v1/instances/demo-instance/reboot?project=demo-project
369702025-03-07T23:13:02.295ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 uri = /v1/instances/demo-instance/reboot?project=demo-project
369712025-03-07T23:13:02.296ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/reboot?project=demo-project
369722025-03-07T23:13:02.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369732025-03-07T23:13:02.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369742025-03-07T23:13:02.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369752025-03-07T23:13:02.302ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369762025-03-07T23:13:02.302ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369772025-03-07T23:13:02.304ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369782025-03-07T23:13:02.307ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
369792025-03-07T23:13:02.307ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
369802025-03-07T23:13:02.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369812025-03-07T23:13:02.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369822025-03-07T23:13:02.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369832025-03-07T23:13:02.311ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
369842025-03-07T23:13:02.311ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369852025-03-07T23:13:02.311ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369862025-03-07T23:13:02.312ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369872025-03-07T23:13:02.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
369882025-03-07T23:13:02.324ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
369892025-03-07T23:13:02.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369902025-03-07T23:13:02.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369912025-03-07T23:13:02.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369922025-03-07T23:13:02.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
369932025-03-07T23:13:02.330ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
369942025-03-07T23:13:02.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369952025-03-07T23:13:02.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369962025-03-07T23:13:02.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369972025-03-07T23:13:02.335ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
369982025-03-07T23:13:02.335ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369992025-03-07T23:13:02.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370002025-03-07T23:13:02.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370012025-03-07T23:13:02.341ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
370022025-03-07T23:13:02.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
370032025-03-07T23:13:02.345ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 uri = /v1/instances/demo-instance/reboot?project=demo-project
370042025-03-07T23:13:02.345ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370052025-03-07T23:13:02.345ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370062025-03-07T23:13:02.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370072025-03-07T23:13:02.348ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
370082025-03-07T23:13:02.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370092025-03-07T23:13:02.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370102025-03-07T23:13:02.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370112025-03-07T23:13:02.363ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370122025-03-07T23:13:02.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370132025-03-07T23:13:02.364ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370142025-03-07T23:13:02.367ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/reboot?project=demo-project
370152025-03-07T23:13:02.369ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/reboot?project=demo-project
370162025-03-07T23:13:02.369ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370172025-03-07T23:13:02.369ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370182025-03-07T23:13:02.369ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370192025-03-07T23:13:02.376ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/reboot?project=demo-project
370202025-03-07T23:13:02.376ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370212025-03-07T23:13:02.377ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370222025-03-07T23:13:02.377ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370232025-03-07T23:13:02.380ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/reboot?project=demo-project
370242025-03-07T23:13:02.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
370252025-03-07T23:13:02.380ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370262025-03-07T23:13:02.381ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
370272025-03-07T23:13:02.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
370282025-03-07T23:13:02.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/reboot?project=demo-project
370292025-03-07T23:13:02.408ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 113715 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 61bb6c86-b0cf-45fe-a80a-2ef8e72ec127 response_code = 404 uri = /v1/instances/demo-instance/reboot?project=demo-project
370302025-03-07T23:13:02.409ZINFOtest_unauthorized (external client test context): client received response status = 404
370312025-03-07T23:13:02.410ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
370322025-03-07T23:13:02.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370332025-03-07T23:13:02.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d76fd31-57b4-472b-87d8-d851e5b205cf uri = /v1/instances/demo-instance/reboot?project=demo-project
370342025-03-07T23:13:02.410ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d76fd31-57b4-472b-87d8-d851e5b205cf uri = /v1/instances/demo-instance/reboot?project=demo-project
370352025-03-07T23:13:02.410ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d76fd31-57b4-472b-87d8-d851e5b205cf uri = /v1/instances/demo-instance/reboot?project=demo-project
370362025-03-07T23:13:02.410ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d76fd31-57b4-472b-87d8-d851e5b205cf uri = /v1/instances/demo-instance/reboot?project=demo-project
370372025-03-07T23:13:02.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 738 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0d76fd31-57b4-472b-87d8-d851e5b205cf response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
370382025-03-07T23:13:02.410ZINFOtest_unauthorized (external client test context): client received response status = 401
370392025-03-07T23:13:02.410ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
370402025-03-07T23:13:02.412ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370412025-03-07T23:13:02.412ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a23adac8-9566-4588-b372-299eaf1051ad uri = /v1/instances/demo-instance/reboot?project=demo-project
370422025-03-07T23:13:02.412ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a23adac8-9566-4588-b372-299eaf1051ad uri = /v1/instances/demo-instance/reboot?project=demo-project
370432025-03-07T23:13:02.412ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a23adac8-9566-4588-b372-299eaf1051ad uri = /v1/instances/demo-instance/reboot?project=demo-project
370442025-03-07T23:13:02.412ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 206 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = a23adac8-9566-4588-b372-299eaf1051ad response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
370452025-03-07T23:13:02.412ZINFOtest_unauthorized (external client test context): client received response status = 401
370462025-03-07T23:13:02.412ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
370472025-03-07T23:13:02.412ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370482025-03-07T23:13:02.412ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9519b645-fa26-42f3-9028-58483dd8307b uri = /v1/instances/demo-instance/reboot?project=demo-project
370492025-03-07T23:13:02.412ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9519b645-fa26-42f3-9028-58483dd8307b uri = /v1/instances/demo-instance/reboot?project=demo-project
370502025-03-07T23:13:02.414ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2209:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2220:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9519b645-fa26-42f3-9028-58483dd8307b uri = /v1/instances/demo-instance/reboot?project=demo-project
370512025-03-07T23:13:02.414ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1674 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 9519b645-fa26-42f3-9028-58483dd8307b response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
370522025-03-07T23:13:02.415ZINFOtest_unauthorized (external client test context): client received response status = 401
370532025-03-07T23:13:02.416ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
370542025-03-07T23:13:02.416ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370552025-03-07T23:13:02.416ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a05e5a4a-dfe3-4dd7-95e5-acc2beeaf5ca uri = /v1/instances/demo-instance/reboot?project=demo-project
370562025-03-07T23:13:02.416ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 172 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a05e5a4a-dfe3-4dd7-95e5-acc2beeaf5ca response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370572025-03-07T23:13:02.416ZINFOtest_unauthorized (external client test context): client received response status = 405
370582025-03-07T23:13:02.416ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
370592025-03-07T23:13:02.416ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370602025-03-07T23:13:02.416ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a50c5460-2d09-4d16-8dea-0e0686765b8e uri = /v1/instances/demo-instance/reboot?project=demo-project
370612025-03-07T23:13:02.416ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = a50c5460-2d09-4d16-8dea-0e0686765b8e response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370622025-03-07T23:13:02.416ZINFOtest_unauthorized (external client test context): client received response status = 405
370632025-03-07T23:13:02.416ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
370642025-03-07T23:13:02.416ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370652025-03-07T23:13:02.416ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fcf50a1f-5c85-42a3-a337-01f5751625cb uri = /v1/instances/demo-instance/reboot?project=demo-project
370662025-03-07T23:13:02.417ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = fcf50a1f-5c85-42a3-a337-01f5751625cb response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370672025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client received response status = 405
370682025-03-07T23:13:02.418ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
370692025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370702025-03-07T23:13:02.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 58672629-a188-494a-9cf0-da362c6e6302 uri = /v1/instances/demo-instance/reboot?project=demo-project
370712025-03-07T23:13:02.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 58672629-a188-494a-9cf0-da362c6e6302 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370722025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client received response status = 405
370732025-03-07T23:13:02.418ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
370742025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370752025-03-07T23:13:02.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 95ff27b1-9a0f-404b-99e5-54b289ab9d1f uri = /v1/instances/demo-instance/reboot?project=demo-project
370762025-03-07T23:13:02.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 95ff27b1-9a0f-404b-99e5-54b289ab9d1f response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370772025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client received response status = 405
370782025-03-07T23:13:02.418ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
370792025-03-07T23:13:02.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370802025-03-07T23:13:02.418ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5233a45c-350d-4575-92d3-ba83f75c886d uri = /v1/instances/demo-instance/reboot?project=demo-project
370812025-03-07T23:13:02.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 5233a45c-350d-4575-92d3-ba83f75c886d response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370822025-03-07T23:13:02.420ZINFOtest_unauthorized (external client test context): client received response status = 405
370832025-03-07T23:13:02.420ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
370842025-03-07T23:13:02.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370852025-03-07T23:13:02.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f7890466-0924-4223-a638-a2b79716cc97 uri = /v1/instances/demo-instance/reboot?project=demo-project
370862025-03-07T23:13:02.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f7890466-0924-4223-a638-a2b79716cc97 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370872025-03-07T23:13:02.420ZINFOtest_unauthorized (external client test context): client received response status = 405
370882025-03-07T23:13:02.420ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
370892025-03-07T23:13:02.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/reboot?project=demo-project
370902025-03-07T23:13:02.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96122fdc-30f8-4072-9ea3-d2b168200cf2 uri = /v1/instances/demo-instance/reboot?project=demo-project
370912025-03-07T23:13:02.420ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96122fdc-30f8-4072-9ea3-d2b168200cf2 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
370922025-03-07T23:13:02.420ZINFOtest_unauthorized (external client test context): client received response status = 405
370932025-03-07T23:13:02.420ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/reboot?project=demo-project
370942025-03-07T23:13:02.420ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/serial-console?project=demo-project
370952025-03-07T23:13:02.422ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/serial-console?project=demo-project
370962025-03-07T23:13:02.422ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
370972025-03-07T23:13:02.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
370982025-03-07T23:13:02.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e uri = /v1/instances/demo-instance/serial-console?project=demo-project
370992025-03-07T23:13:02.422ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e uri = /v1/instances/demo-instance/serial-console?project=demo-project
371002025-03-07T23:13:02.422ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371012025-03-07T23:13:02.422ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371022025-03-07T23:13:02.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371032025-03-07T23:13:02.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371042025-03-07T23:13:02.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371052025-03-07T23:13:02.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371062025-03-07T23:13:02.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371072025-03-07T23:13:02.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
371082025-03-07T23:13:02.430ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
371092025-03-07T23:13:02.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371102025-03-07T23:13:02.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371112025-03-07T23:13:02.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371122025-03-07T23:13:02.443ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
371132025-03-07T23:13:02.444ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371142025-03-07T23:13:02.444ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371152025-03-07T23:13:02.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371162025-03-07T23:13:02.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
371172025-03-07T23:13:02.466ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
371182025-03-07T23:13:02.467ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371192025-03-07T23:13:02.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371202025-03-07T23:13:02.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371212025-03-07T23:13:02.474ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
371222025-03-07T23:13:02.475ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
371232025-03-07T23:13:02.475ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371242025-03-07T23:13:02.476ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371252025-03-07T23:13:02.477ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371262025-03-07T23:13:02.480ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
371272025-03-07T23:13:02.480ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
371282025-03-07T23:13:02.480ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
371292025-03-07T23:13:02.482ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
371302025-03-07T23:13:02.495ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
371312025-03-07T23:13:02.529ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
371322025-03-07T23:13:02.545ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e uri = /v1/instances/demo-instance/serial-console?project=demo-project
371332025-03-07T23:13:02.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371342025-03-07T23:13:02.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371352025-03-07T23:13:02.548ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371362025-03-07T23:13:02.556ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54096 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
371372025-03-07T23:13:02.562ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54096 req_id = b8740027-7847-4be3-9b6c-6e67ed517b0a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
371382025-03-07T23:13:02.563ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 926 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54096 req_id = b8740027-7847-4be3-9b6c-6e67ed517b0a response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
371392025-03-07T23:13:02.565ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371402025-03-07T23:13:02.565ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371412025-03-07T23:13:02.567ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371422025-03-07T23:13:02.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371432025-03-07T23:13:02.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371442025-03-07T23:13:02.571ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371452025-03-07T23:13:02.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371462025-03-07T23:13:02.577ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/serial-console?project=demo-project
371472025-03-07T23:13:02.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371482025-03-07T23:13:02.577ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371492025-03-07T23:13:02.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371502025-03-07T23:13:02.592ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371512025-03-07T23:13:02.593ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371522025-03-07T23:13:02.594ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console?project=demo-project
371532025-03-07T23:13:02.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371542025-03-07T23:13:02.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371552025-03-07T23:13:02.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371562025-03-07T23:13:02.604ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371572025-03-07T23:13:02.605ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371582025-03-07T23:13:02.606ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371592025-03-07T23:13:02.606ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
371602025-03-07T23:13:02.606ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console?project=demo-project
371612025-03-07T23:13:02.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
371622025-03-07T23:13:02.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371632025-03-07T23:13:02.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371642025-03-07T23:13:02.614ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
371652025-03-07T23:13:02.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/serial-console?project=demo-project
371662025-03-07T23:13:02.633ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 212946 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 0e925a3a-f965-4320-9714-d3b9c443473e response_code = 404 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371672025-03-07T23:13:02.634ZINFOtest_unauthorized (external client test context): client received response status = 404
371682025-03-07T23:13:02.636ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
371692025-03-07T23:13:02.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
371702025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bba8da1a-72d7-4055-8fb7-8bbd2cfc1589 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371712025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bba8da1a-72d7-4055-8fb7-8bbd2cfc1589 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371722025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bba8da1a-72d7-4055-8fb7-8bbd2cfc1589 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371732025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bba8da1a-72d7-4055-8fb7-8bbd2cfc1589 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371742025-03-07T23:13:02.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 887 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = bba8da1a-72d7-4055-8fb7-8bbd2cfc1589 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371752025-03-07T23:13:02.638ZINFOtest_unauthorized (external client test context): client received response status = 401
371762025-03-07T23:13:02.638ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
371772025-03-07T23:13:02.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
371782025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b7944871-2e7e-4340-bdd4-cd4f30334d31 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371792025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b7944871-2e7e-4340-bdd4-cd4f30334d31 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371802025-03-07T23:13:02.638ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b7944871-2e7e-4340-bdd4-cd4f30334d31 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371812025-03-07T23:13:02.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 226 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = b7944871-2e7e-4340-bdd4-cd4f30334d31 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371822025-03-07T23:13:02.639ZINFOtest_unauthorized (external client test context): client received response status = 401
371832025-03-07T23:13:02.639ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
371842025-03-07T23:13:02.639ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
371852025-03-07T23:13:02.639ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 95214512-2624-4a27-b8d0-d64aefbbac78 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371862025-03-07T23:13:02.639ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 95214512-2624-4a27-b8d0-d64aefbbac78 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371872025-03-07T23:13:02.640ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2295:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2314:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>), dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 95214512-2624-4a27-b8d0-d64aefbbac78 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371882025-03-07T23:13:02.641ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1134 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = 95214512-2624-4a27-b8d0-d64aefbbac78 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371892025-03-07T23:13:02.642ZINFOtest_unauthorized (external client test context): client received response status = 401
371902025-03-07T23:13:02.642ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
371912025-03-07T23:13:02.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
371922025-03-07T23:13:02.642ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34034576-16c0-4e7d-bdd8-38721461b8b0 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371932025-03-07T23:13:02.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = 34034576-16c0-4e7d-bdd8-38721461b8b0 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371942025-03-07T23:13:02.642ZINFOtest_unauthorized (external client test context): client received response status = 405
371952025-03-07T23:13:02.642ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
371962025-03-07T23:13:02.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
371972025-03-07T23:13:02.642ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f7b02773-6c02-4ce9-b750-5069529717e3 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371982025-03-07T23:13:02.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 99 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = f7b02773-6c02-4ce9-b750-5069529717e3 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
371992025-03-07T23:13:02.644ZINFOtest_unauthorized (external client test context): client received response status = 405
372002025-03-07T23:13:02.644ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
372012025-03-07T23:13:02.645ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372022025-03-07T23:13:02.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9867ad4-a5a7-494f-b46d-61f92220841f uri = /v1/instances/demo-instance/serial-console?project=demo-project
372032025-03-07T23:13:02.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = d9867ad4-a5a7-494f-b46d-61f92220841f response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372042025-03-07T23:13:02.645ZINFOtest_unauthorized (external client test context): client received response status = 405
372052025-03-07T23:13:02.645ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
372062025-03-07T23:13:02.645ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372072025-03-07T23:13:02.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dd7595b5-d2e0-473f-8c5c-eaac188bc7d6 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372082025-03-07T23:13:02.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53894 req_id = dd7595b5-d2e0-473f-8c5c-eaac188bc7d6 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372092025-03-07T23:13:02.645ZINFOtest_unauthorized (external client test context): client received response status = 405
372102025-03-07T23:13:02.645ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
372112025-03-07T23:13:02.645ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372122025-03-07T23:13:02.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ddc7b68b-4877-4000-b8c6-1acb8c0ba0c8 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372132025-03-07T23:13:02.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = ddc7b68b-4877-4000-b8c6-1acb8c0ba0c8 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372142025-03-07T23:13:02.646ZINFOtest_unauthorized (external client test context): client received response status = 405
372152025-03-07T23:13:02.646ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
372162025-03-07T23:13:02.646ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372172025-03-07T23:13:02.646ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0a7bff3d-9187-447a-bfcb-4b8e939a7372 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372182025-03-07T23:13:02.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 0a7bff3d-9187-447a-bfcb-4b8e939a7372 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372192025-03-07T23:13:02.646ZINFOtest_unauthorized (external client test context): client received response status = 405
372202025-03-07T23:13:02.646ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
372212025-03-07T23:13:02.646ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372222025-03-07T23:13:02.646ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 51e5a600-4e4f-4b74-a1cc-0a0212dc2627 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372232025-03-07T23:13:02.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 51e5a600-4e4f-4b74-a1cc-0a0212dc2627 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372242025-03-07T23:13:02.647ZINFOtest_unauthorized (external client test context): client received response status = 405
372252025-03-07T23:13:02.647ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
372262025-03-07T23:13:02.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372272025-03-07T23:13:02.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f318f0d-12a6-4e1c-9a35-ec64f52b937f uri = /v1/instances/demo-instance/serial-console?project=demo-project
372282025-03-07T23:13:02.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 150 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53894 req_id = 8f318f0d-12a6-4e1c-9a35-ec64f52b937f response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372292025-03-07T23:13:02.652ZINFOtest_unauthorized (external client test context): client received response status = 405
372302025-03-07T23:13:02.652ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
372312025-03-07T23:13:02.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372322025-03-07T23:13:02.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b84c3408-b248-4b7e-be9b-d0842c0893a4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372332025-03-07T23:13:02.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = b84c3408-b248-4b7e-be9b-d0842c0893a4 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372342025-03-07T23:13:02.653ZINFOtest_unauthorized (external client test context): client received response status = 405
372352025-03-07T23:13:02.653ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
372362025-03-07T23:13:02.653ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372372025-03-07T23:13:02.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3571d798-096f-4061-a5ee-990964de665c uri = /v1/instances/demo-instance/serial-console?project=demo-project
372382025-03-07T23:13:02.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 3571d798-096f-4061-a5ee-990964de665c response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372392025-03-07T23:13:02.653ZINFOtest_unauthorized (external client test context): client received response status = 405
372402025-03-07T23:13:02.653ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
372412025-03-07T23:13:02.653ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372422025-03-07T23:13:02.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 87f09bf5-9efa-41a6-b2b9-1cbad3bf0f5c uri = /v1/instances/demo-instance/serial-console?project=demo-project
372432025-03-07T23:13:02.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 87f09bf5-9efa-41a6-b2b9-1cbad3bf0f5c response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372442025-03-07T23:13:02.654ZINFOtest_unauthorized (external client test context): client received response status = 405
372452025-03-07T23:13:02.654ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
372462025-03-07T23:13:02.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372472025-03-07T23:13:02.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 538c4289-3c8f-4337-8d4f-6ba0c267bd4e uri = /v1/instances/demo-instance/serial-console?project=demo-project
372482025-03-07T23:13:02.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53894 req_id = 538c4289-3c8f-4337-8d4f-6ba0c267bd4e response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372492025-03-07T23:13:02.655ZINFOtest_unauthorized (external client test context): client received response status = 405
372502025-03-07T23:13:02.655ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
372512025-03-07T23:13:02.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372522025-03-07T23:13:02.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ff1dd7b0-92d0-471c-8f9a-f4c3fe5d32a4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372532025-03-07T23:13:02.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = ff1dd7b0-92d0-471c-8f9a-f4c3fe5d32a4 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372542025-03-07T23:13:02.655ZINFOtest_unauthorized (external client test context): client received response status = 405
372552025-03-07T23:13:02.656ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
372562025-03-07T23:13:02.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372572025-03-07T23:13:02.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fd78a0a5-860a-4187-963e-8d218fcd6772 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372582025-03-07T23:13:02.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = fd78a0a5-860a-4187-963e-8d218fcd6772 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372592025-03-07T23:13:02.657ZINFOtest_unauthorized (external client test context): client received response status = 405
372602025-03-07T23:13:02.657ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
372612025-03-07T23:13:02.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372622025-03-07T23:13:02.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f61350bd-ccd6-4983-a1ff-202709dcda4f uri = /v1/instances/demo-instance/serial-console?project=demo-project
372632025-03-07T23:13:02.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = f61350bd-ccd6-4983-a1ff-202709dcda4f response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372642025-03-07T23:13:02.658ZINFOtest_unauthorized (external client test context): client received response status = 405
372652025-03-07T23:13:02.658ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
372662025-03-07T23:13:02.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console?project=demo-project
372672025-03-07T23:13:02.659ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96345901-d2f7-452e-8920-2a1cd9c0b149 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372682025-03-07T23:13:02.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 253 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53894 req_id = 96345901-d2f7-452e-8920-2a1cd9c0b149 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
372692025-03-07T23:13:02.659ZINFOtest_unauthorized (external client test context): client received response status = 405
372702025-03-07T23:13:02.660ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/serial-console?project=demo-project
372712025-03-07T23:13:02.660ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372722025-03-07T23:13:02.660ZINFOtest_unauthorized: test: privileged GET WebSocket url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372732025-03-07T23:13:02.660ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
372742025-03-07T23:13:02.660ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372752025-03-07T23:13:02.660ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 423 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372762025-03-07T23:13:02.661ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372772025-03-07T23:13:02.661ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372782025-03-07T23:13:02.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372792025-03-07T23:13:02.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372802025-03-07T23:13:02.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372812025-03-07T23:13:02.665ZINFOtest_unauthorized (external client test context): client received response status = 101
372822025-03-07T23:13:02.666ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372832025-03-07T23:13:02.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
372842025-03-07T23:13:02.666ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53896
372852025-03-07T23:13:02.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372862025-03-07T23:13:02.666ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 481 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372872025-03-07T23:13:02.668ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372882025-03-07T23:13:02.668ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372892025-03-07T23:13:02.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372902025-03-07T23:13:02.670ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372912025-03-07T23:13:02.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372922025-03-07T23:13:02.671ZINFOtest_unauthorized (external client test context): client received response status = 101
372932025-03-07T23:13:02.672ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
372942025-03-07T23:13:02.672ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
372952025-03-07T23:13:02.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372962025-03-07T23:13:02.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372972025-03-07T23:13:02.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372982025-03-07T23:13:02.674ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372992025-03-07T23:13:02.674ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373002025-03-07T23:13:02.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373012025-03-07T23:13:02.675ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53898
373022025-03-07T23:13:02.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373032025-03-07T23:13:02.677ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 631 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373042025-03-07T23:13:02.677ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373052025-03-07T23:13:02.677ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373062025-03-07T23:13:02.677ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373072025-03-07T23:13:02.678ZERROtest_unauthorized (dropshot_external): Error returned from handler: Unauthenticated { internal_message: "looking up Organization by name: Actor required" } local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53898 req_id = 02fdffa8-4345-40d7-aa54-35395eaadf60 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373082025-03-07T23:13:02.678ZINFOtest_unauthorized (external client test context): client received response status = 101
373092025-03-07T23:13:02.678ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373102025-03-07T23:13:02.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373112025-03-07T23:13:02.678ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53900
373122025-03-07T23:13:02.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53900 req_id = 61098cd9-bb2a-467d-bb45-7baf4b5dcd1f uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373132025-03-07T23:13:02.679ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 276 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53900 req_id = 61098cd9-bb2a-467d-bb45-7baf4b5dcd1f response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373142025-03-07T23:13:02.679ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53900 req_id = 61098cd9-bb2a-467d-bb45-7baf4b5dcd1f uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373152025-03-07T23:13:02.680ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53900 req_id = 61098cd9-bb2a-467d-bb45-7baf4b5dcd1f uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373162025-03-07T23:13:02.680ZERROtest_unauthorized (dropshot_external): Error returned from handler: HttpError { status_code: 401, error_code: Some("Unauthorized"), external_message: "credentials missing or invalid", internal_message: "unknown actor \"Jack-Donaghy\"", headers: None } local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53900 req_id = 61098cd9-bb2a-467d-bb45-7baf4b5dcd1f upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373172025-03-07T23:13:02.680ZINFOtest_unauthorized (external client test context): client received response status = 101
373182025-03-07T23:13:02.680ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373192025-03-07T23:13:02.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373202025-03-07T23:13:02.681ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53902
373212025-03-07T23:13:02.681ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53902 req_id = 67e570ba-cd37-4486-b233-2567add9048d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373222025-03-07T23:13:02.682ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 567 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53902 req_id = 67e570ba-cd37-4486-b233-2567add9048d response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373232025-03-07T23:13:02.682ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53902 req_id = 67e570ba-cd37-4486-b233-2567add9048d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373242025-03-07T23:13:02.683ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2327:73 11: {async_block#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl> at ./external-api/src/lib.rs:1202:5 12: {async_block#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/websocket.rs:240:69 13: poll<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 14: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 15: with_mut<tokio::runtime::task::core::Stage<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 16: poll<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 17: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 18: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 19: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 20: __rust_try 21: try<core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 22: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 23: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 24: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 25: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 26: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 27: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 28: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 29: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 30: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 31: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 32: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 33: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 34: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 35: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 36: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 37: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 38: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 39: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 40: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 41: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 42: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 43: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 44: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 45: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 46: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 47: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 48: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 49: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 50: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 51: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 52: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 53: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 54: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 55: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 56: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 57: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 58: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 59: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 60: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 61: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 62: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 63: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 64: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 65: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 66: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 67: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 68: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 69: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 70: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 71: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 72: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 73: <unknown> 74: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53902 req_id = 67e570ba-cd37-4486-b233-2567add9048d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373252025-03-07T23:13:02.683ZERROtest_unauthorized (dropshot_external): Error returned from handler: HttpError { status_code: 401, error_code: Some("Unauthorized"), external_message: "credentials missing or invalid", internal_message: "bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list", headers: None } local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53902 req_id = 67e570ba-cd37-4486-b233-2567add9048d upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373262025-03-07T23:13:02.684ZINFOtest_unauthorized (external client test context): client received response status = 101
373272025-03-07T23:13:02.685ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373282025-03-07T23:13:02.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373292025-03-07T23:13:02.685ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:41589 remote_addr = 127.0.0.1:53904
373302025-03-07T23:13:02.686ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 08ceac4f-f1bb-4b7a-912d-5afc5f2adda1 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373312025-03-07T23:13:02.686ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 111 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 08ceac4f-f1bb-4b7a-912d-5afc5f2adda1 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373322025-03-07T23:13:02.686ZINFOtest_unauthorized (external client test context): client received response status = 405
373332025-03-07T23:13:02.687ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373342025-03-07T23:13:02.687ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373352025-03-07T23:13:02.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
373362025-03-07T23:13:02.687ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
373372025-03-07T23:13:02.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373382025-03-07T23:13:02.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373392025-03-07T23:13:02.691ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373402025-03-07T23:13:02.694ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
373412025-03-07T23:13:02.694ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
373422025-03-07T23:13:02.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373432025-03-07T23:13:02.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373442025-03-07T23:13:02.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373452025-03-07T23:13:02.697ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 1f1f4f30-f681-4d4d-bc2f-97aac18f7c48 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373462025-03-07T23:13:02.698ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 1f1f4f30-f681-4d4d-bc2f-97aac18f7c48 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373472025-03-07T23:13:02.702ZINFOtest_unauthorized (external client test context): client received response status = 405
373482025-03-07T23:13:02.702ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373492025-03-07T23:13:02.702ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373502025-03-07T23:13:02.702ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = c7d077cf-c36f-410f-a717-8fd762477d18 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373512025-03-07T23:13:02.702ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = c7d077cf-c36f-410f-a717-8fd762477d18 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373522025-03-07T23:13:02.703ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
373532025-03-07T23:13:02.703ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373542025-03-07T23:13:02.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373552025-03-07T23:13:02.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373562025-03-07T23:13:02.703ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
373572025-03-07T23:13:02.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373582025-03-07T23:13:02.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373592025-03-07T23:13:02.704ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373602025-03-07T23:13:02.704ZINFOtest_unauthorized (external client test context): client received response status = 405
373612025-03-07T23:13:02.706ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373622025-03-07T23:13:02.706ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373632025-03-07T23:13:02.721ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
373642025-03-07T23:13:02.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
373652025-03-07T23:13:02.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373662025-03-07T23:13:02.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373672025-03-07T23:13:02.730ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
373682025-03-07T23:13:02.730ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 32e95f0f-255c-4d31-8b9e-f28e42b5373d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373692025-03-07T23:13:02.730ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 221 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 32e95f0f-255c-4d31-8b9e-f28e42b5373d response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373702025-03-07T23:13:02.732ZINFOtest_unauthorized (external client test context): client received response status = 405
373712025-03-07T23:13:02.732ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373722025-03-07T23:13:02.732ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373732025-03-07T23:13:02.732ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = a7a7fdb7-6d45-4d21-a317-7a89603f3da2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373742025-03-07T23:13:02.732ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = a7a7fdb7-6d45-4d21-a317-7a89603f3da2 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373752025-03-07T23:13:02.732ZINFOtest_unauthorized (external client test context): client received response status = 405
373762025-03-07T23:13:02.732ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373772025-03-07T23:13:02.732ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373782025-03-07T23:13:02.733ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b9ce9014-da20-4fe1-a17a-1197d784b007 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373792025-03-07T23:13:02.734ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b9ce9014-da20-4fe1-a17a-1197d784b007 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373802025-03-07T23:13:02.734ZINFOtest_unauthorized (external client test context): client received response status = 405
373812025-03-07T23:13:02.734ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373822025-03-07T23:13:02.734ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373832025-03-07T23:13:02.734ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = fdcacc63-77ee-4a09-8fd7-01b8b124ef70 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373842025-03-07T23:13:02.734ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = fdcacc63-77ee-4a09-8fd7-01b8b124ef70 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373852025-03-07T23:13:02.734ZINFOtest_unauthorized (external client test context): client received response status = 405
373862025-03-07T23:13:02.734ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373872025-03-07T23:13:02.734ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373882025-03-07T23:13:02.734ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = da0a05ee-6e47-4458-8115-70262b3cfe34 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373892025-03-07T23:13:02.734ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = da0a05ee-6e47-4458-8115-70262b3cfe34 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373902025-03-07T23:13:02.734ZINFOtest_unauthorized (external client test context): client received response status = 405
373912025-03-07T23:13:02.734ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373922025-03-07T23:13:02.735ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
373932025-03-07T23:13:02.736ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 999164a6-518a-495f-a5c2-b5378df07df6 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373942025-03-07T23:13:02.736ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 999164a6-518a-495f-a5c2-b5378df07df6 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
373952025-03-07T23:13:02.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
373962025-03-07T23:13:02.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
373972025-03-07T23:13:02.742ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
373982025-03-07T23:13:02.742ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
373992025-03-07T23:13:02.742ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374002025-03-07T23:13:02.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
374012025-03-07T23:13:02.746ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
374022025-03-07T23:13:02.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374032025-03-07T23:13:02.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374042025-03-07T23:13:02.748ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374052025-03-07T23:13:02.748ZINFOtest_unauthorized (external client test context): client received response status = 405
374062025-03-07T23:13:02.749ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374072025-03-07T23:13:02.751ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374082025-03-07T23:13:02.752ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = a7f396ff-c221-4147-8d28-90460f388ec1 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374092025-03-07T23:13:02.752ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 102 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = a7f396ff-c221-4147-8d28-90460f388ec1 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374102025-03-07T23:13:02.752ZINFOtest_unauthorized (external client test context): client received response status = 405
374112025-03-07T23:13:02.752ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374122025-03-07T23:13:02.752ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374132025-03-07T23:13:02.752ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 58d01787-c2b2-4036-bdcf-e9320682ec13 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374142025-03-07T23:13:02.752ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 58d01787-c2b2-4036-bdcf-e9320682ec13 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374152025-03-07T23:13:02.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
374162025-03-07T23:13:02.752ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
374172025-03-07T23:13:02.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374182025-03-07T23:13:02.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374192025-03-07T23:13:02.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374202025-03-07T23:13:02.753ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
374212025-03-07T23:13:02.754ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374222025-03-07T23:13:02.754ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374232025-03-07T23:13:02.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374242025-03-07T23:13:02.762ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
374252025-03-07T23:13:02.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374262025-03-07T23:13:02.763ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374272025-03-07T23:13:02.764ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374282025-03-07T23:13:02.772ZINFOtest_unauthorized (external client test context): client received response status = 405
374292025-03-07T23:13:02.772ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374302025-03-07T23:13:02.772ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374312025-03-07T23:13:02.772ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = e678c924-7e8c-4ead-9500-f5762d625f84 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374322025-03-07T23:13:02.773ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 107 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = e678c924-7e8c-4ead-9500-f5762d625f84 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374332025-03-07T23:13:02.774ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
374342025-03-07T23:13:02.779ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
374352025-03-07T23:13:02.779ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374362025-03-07T23:13:02.782ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374372025-03-07T23:13:02.782ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374382025-03-07T23:13:02.782ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374392025-03-07T23:13:02.783ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
374402025-03-07T23:13:02.786ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
374412025-03-07T23:13:02.786ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374422025-03-07T23:13:02.789ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374432025-03-07T23:13:02.789ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374442025-03-07T23:13:02.790ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374452025-03-07T23:13:02.795ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374462025-03-07T23:13:02.795ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374472025-03-07T23:13:02.795ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374482025-03-07T23:13:02.796ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374492025-03-07T23:13:02.798ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374502025-03-07T23:13:02.800ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374512025-03-07T23:13:02.803ZINFOtest_unauthorized (external client test context): client received response status = 405
374522025-03-07T23:13:02.804ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374532025-03-07T23:13:02.804ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374542025-03-07T23:13:02.805ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = b8080a08-ea47-40ba-9628-10350c281014 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374552025-03-07T23:13:02.807ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 96 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = b8080a08-ea47-40ba-9628-10350c281014 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374562025-03-07T23:13:02.808ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374572025-03-07T23:13:02.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374582025-03-07T23:13:02.809ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374592025-03-07T23:13:02.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374602025-03-07T23:13:02.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374612025-03-07T23:13:02.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374622025-03-07T23:13:02.819ZINFOtest_unauthorized (external client test context): client received response status = 405
374632025-03-07T23:13:02.819ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374642025-03-07T23:13:02.819ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374652025-03-07T23:13:02.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374662025-03-07T23:13:02.831ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374672025-03-07T23:13:02.831ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374682025-03-07T23:13:02.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374692025-03-07T23:13:02.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374702025-03-07T23:13:02.833ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374712025-03-07T23:13:02.833ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374722025-03-07T23:13:02.833ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374732025-03-07T23:13:02.833ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374742025-03-07T23:13:02.835ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374752025-03-07T23:13:02.836ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = e722f139-8d59-49e4-82aa-7218322f1777 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374762025-03-07T23:13:02.836ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 110 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = e722f139-8d59-49e4-82aa-7218322f1777 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374772025-03-07T23:13:02.840ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374782025-03-07T23:13:02.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374792025-03-07T23:13:02.840ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374802025-03-07T23:13:02.841ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374812025-03-07T23:13:02.843ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374822025-03-07T23:13:02.844ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374832025-03-07T23:13:02.844ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374842025-03-07T23:13:02.860ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374852025-03-07T23:13:02.861ZINFOtest_unauthorized (external client test context): client received response status = 405
374862025-03-07T23:13:02.863ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374872025-03-07T23:13:02.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
374882025-03-07T23:13:02.863ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 25626559-4c67-4096-827a-91aff5e2c65b uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374892025-03-07T23:13:02.863ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 127 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 25626559-4c67-4096-827a-91aff5e2c65b response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374902025-03-07T23:13:02.864ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374912025-03-07T23:13:02.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374922025-03-07T23:13:02.864ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374932025-03-07T23:13:02.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374942025-03-07T23:13:02.866ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374952025-03-07T23:13:02.866ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374962025-03-07T23:13:02.866ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374972025-03-07T23:13:02.866ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374982025-03-07T23:13:02.878ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
374992025-03-07T23:13:02.898ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375002025-03-07T23:13:02.898ZERROtest_unauthorized (dropshot_external): Error returned from handler: ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") } local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53896 req_id = e4aa261b-4fee-48c7-ad88-39ae465ea1c2 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375012025-03-07T23:13:02.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375022025-03-07T23:13:02.905ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375032025-03-07T23:13:02.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375042025-03-07T23:13:02.906ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375052025-03-07T23:13:02.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375062025-03-07T23:13:02.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375072025-03-07T23:13:02.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375082025-03-07T23:13:02.906ZINFOtest_unauthorized (external client test context): client received response status = 405
375092025-03-07T23:13:02.908ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375102025-03-07T23:13:02.908ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/serial-console/stream?project=demo-project
375112025-03-07T23:13:02.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 7653fe51-0bed-48ca-9dfa-5dc36d499950 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375122025-03-07T23:13:02.910ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 108 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 7653fe51-0bed-48ca-9dfa-5dc36d499950 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375132025-03-07T23:13:02.912ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375142025-03-07T23:13:02.912ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375152025-03-07T23:13:02.912ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375162025-03-07T23:13:02.913ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375172025-03-07T23:13:02.914ZINFOtest_unauthorized (external client test context): client received response status = 405
375182025-03-07T23:13:02.914ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375192025-03-07T23:13:02.914ZINFOtest_unauthorized: test: begin endpoint url = /v1/network-interfaces?project=demo-project&instance=demo-instance
375202025-03-07T23:13:02.914ZINFOtest_unauthorized: test: privileged GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
375212025-03-07T23:13:02.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
375222025-03-07T23:13:02.918ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375232025-03-07T23:13:02.921ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375242025-03-07T23:13:02.922ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375252025-03-07T23:13:02.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375262025-03-07T23:13:02.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375272025-03-07T23:13:02.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375282025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
375292025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
375302025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
375312025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
375322025-03-07T23:13:02.929ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
375332025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
375342025-03-07T23:13:02.929ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
375352025-03-07T23:13:02.929ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
375362025-03-07T23:13:02.930ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
375372025-03-07T23:13:02.930ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375382025-03-07T23:13:02.930ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375392025-03-07T23:13:02.930ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375402025-03-07T23:13:02.930ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375412025-03-07T23:13:02.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375422025-03-07T23:13:02.935ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375432025-03-07T23:13:02.935ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375442025-03-07T23:13:02.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
375452025-03-07T23:13:02.936ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
375462025-03-07T23:13:02.936ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375472025-03-07T23:13:02.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375482025-03-07T23:13:02.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375492025-03-07T23:13:02.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375502025-03-07T23:13:02.948ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375512025-03-07T23:13:02.949ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375522025-03-07T23:13:02.949ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375532025-03-07T23:13:02.951ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375542025-03-07T23:13:02.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
375552025-03-07T23:13:02.952ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375562025-03-07T23:13:02.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375572025-03-07T23:13:02.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375582025-03-07T23:13:02.953ZERROtest_unauthorized (dropshot_external): Error returned from handler: InvalidRequest { message: MessagePair { external_message: "cannot connect to serial console of instance in state \"starting\"", internal_context: "" } } local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53894 req_id = a395fdaf-8b87-404a-9c54-8e7af1b6fc87 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
375592025-03-07T23:13:02.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
375602025-03-07T23:13:02.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
375612025-03-07T23:13:02.960ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375622025-03-07T23:13:02.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375632025-03-07T23:13:02.961ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375642025-03-07T23:13:02.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
375652025-03-07T23:13:02.964ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
375662025-03-07T23:13:02.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375672025-03-07T23:13:02.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375682025-03-07T23:13:02.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375692025-03-07T23:13:02.971ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
375702025-03-07T23:13:02.972ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375712025-03-07T23:13:02.972ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375722025-03-07T23:13:02.973ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375732025-03-07T23:13:02.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
375742025-03-07T23:13:02.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
375752025-03-07T23:13:02.976ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375762025-03-07T23:13:02.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375772025-03-07T23:13:02.977ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375782025-03-07T23:13:02.978ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375792025-03-07T23:13:02.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375802025-03-07T23:13:02.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375812025-03-07T23:13:02.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375822025-03-07T23:13:03.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375832025-03-07T23:13:03.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375842025-03-07T23:13:03.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375852025-03-07T23:13:03.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375862025-03-07T23:13:03.008ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375872025-03-07T23:13:03.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375882025-03-07T23:13:03.008ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375892025-03-07T23:13:03.009ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375902025-03-07T23:13:03.014ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375912025-03-07T23:13:03.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375922025-03-07T23:13:03.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375932025-03-07T23:13:03.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375942025-03-07T23:13:03.019ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375952025-03-07T23:13:03.026ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375962025-03-07T23:13:03.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375972025-03-07T23:13:03.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375982025-03-07T23:13:03.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
375992025-03-07T23:13:03.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376002025-03-07T23:13:03.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376012025-03-07T23:13:03.048ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376022025-03-07T23:13:03.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376032025-03-07T23:13:03.048ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376042025-03-07T23:13:03.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376052025-03-07T23:13:03.065ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376062025-03-07T23:13:03.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376072025-03-07T23:13:03.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376082025-03-07T23:13:03.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376092025-03-07T23:13:03.070ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376102025-03-07T23:13:03.070ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376112025-03-07T23:13:03.070ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376122025-03-07T23:13:03.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376132025-03-07T23:13:03.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376142025-03-07T23:13:03.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376152025-03-07T23:13:03.086ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376162025-03-07T23:13:03.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376172025-03-07T23:13:03.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376182025-03-07T23:13:03.093ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 178005 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = d982dfd8-4e98-4db6-97e5-50bbce40a254 response_code = 200 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376192025-03-07T23:13:03.093ZINFOtest_unauthorized (external client test context): client received response status = 200
376202025-03-07T23:13:03.093ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
376212025-03-07T23:13:03.093ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
376222025-03-07T23:13:03.093ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376232025-03-07T23:13:03.094ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376242025-03-07T23:13:03.094ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376252025-03-07T23:13:03.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376262025-03-07T23:13:03.094ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376272025-03-07T23:13:03.095ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376282025-03-07T23:13:03.098ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376292025-03-07T23:13:03.098ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376302025-03-07T23:13:03.099ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376312025-03-07T23:13:03.103ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
376322025-03-07T23:13:03.103ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
376332025-03-07T23:13:03.103ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376342025-03-07T23:13:03.103ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376352025-03-07T23:13:03.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376362025-03-07T23:13:03.106ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
376372025-03-07T23:13:03.107ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376382025-03-07T23:13:03.107ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376392025-03-07T23:13:03.115ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376402025-03-07T23:13:03.117ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
376412025-03-07T23:13:03.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
376422025-03-07T23:13:03.123ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376432025-03-07T23:13:03.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376442025-03-07T23:13:03.125ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376452025-03-07T23:13:03.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
376462025-03-07T23:13:03.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
376472025-03-07T23:13:03.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376482025-03-07T23:13:03.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376492025-03-07T23:13:03.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376502025-03-07T23:13:03.147ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
376512025-03-07T23:13:03.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
376522025-03-07T23:13:03.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
376532025-03-07T23:13:03.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
376542025-03-07T23:13:03.150ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
376552025-03-07T23:13:03.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
376562025-03-07T23:13:03.157ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376572025-03-07T23:13:03.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376582025-03-07T23:13:03.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376592025-03-07T23:13:03.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376602025-03-07T23:13:03.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376612025-03-07T23:13:03.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376622025-03-07T23:13:03.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376632025-03-07T23:13:03.164ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376642025-03-07T23:13:03.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376652025-03-07T23:13:03.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376662025-03-07T23:13:03.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376672025-03-07T23:13:03.169ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376682025-03-07T23:13:03.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376692025-03-07T23:13:03.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376702025-03-07T23:13:03.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376712025-03-07T23:13:03.175ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376722025-03-07T23:13:03.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376732025-03-07T23:13:03.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376742025-03-07T23:13:03.178ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376752025-03-07T23:13:03.215ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376762025-03-07T23:13:03.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376772025-03-07T23:13:03.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376782025-03-07T23:13:03.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376792025-03-07T23:13:03.221ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
376802025-03-07T23:13:03.221ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
376812025-03-07T23:13:03.222ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
376822025-03-07T23:13:03.225ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
376832025-03-07T23:13:03.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376842025-03-07T23:13:03.271ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376852025-03-07T23:13:03.275ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 181588 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48db7a4c-5c9e-4523-8de8-c073b8c68699 response_code = 404 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376862025-03-07T23:13:03.276ZINFOtest_unauthorized (external client test context): client received response status = 404
376872025-03-07T23:13:03.276ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
376882025-03-07T23:13:03.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
376892025-03-07T23:13:03.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 70917e8e-b05c-420e-85d5-c754e5f60f11 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376902025-03-07T23:13:03.277ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 70917e8e-b05c-420e-85d5-c754e5f60f11 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376912025-03-07T23:13:03.277ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 70917e8e-b05c-420e-85d5-c754e5f60f11 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376922025-03-07T23:13:03.278ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 70917e8e-b05c-420e-85d5-c754e5f60f11 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376932025-03-07T23:13:03.278ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 883 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 70917e8e-b05c-420e-85d5-c754e5f60f11 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
376942025-03-07T23:13:03.279ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
376952025-03-07T23:13:03.279ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
376962025-03-07T23:13:03.280ZINFOtest_unauthorized (external client test context): client received response status = 401
376972025-03-07T23:13:03.280ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
376982025-03-07T23:13:03.280ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
376992025-03-07T23:13:03.281ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 2cbdf037-13f6-4140-83de-2d6ae6382813 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377002025-03-07T23:13:03.282ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 2cbdf037-13f6-4140-83de-2d6ae6382813 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377012025-03-07T23:13:03.282ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 2cbdf037-13f6-4140-83de-2d6ae6382813 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377022025-03-07T23:13:03.282ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 432 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 2cbdf037-13f6-4140-83de-2d6ae6382813 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377032025-03-07T23:13:03.282ZINFOtest_unauthorized (external client test context): client received response status = 401
377042025-03-07T23:13:03.282ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377052025-03-07T23:13:03.283ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377062025-03-07T23:13:03.283ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 6cc65896-1e3a-4a7f-b52f-d7d3b6d3a95b uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377072025-03-07T23:13:03.283ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 6cc65896-1e3a-4a7f-b52f-d7d3b6d3a95b uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377082025-03-07T23:13:03.284ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4514:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4542:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 6cc65896-1e3a-4a7f-b52f-d7d3b6d3a95b uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377092025-03-07T23:13:03.285ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3247 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 6cc65896-1e3a-4a7f-b52f-d7d3b6d3a95b response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377102025-03-07T23:13:03.286ZINFOtest_unauthorized (external client test context): client received response status = 401
377112025-03-07T23:13:03.287ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377122025-03-07T23:13:03.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377132025-03-07T23:13:03.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 40243f35-a136-458d-97c7-a6d845e3359e uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377142025-03-07T23:13:03.287ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 40243f35-a136-458d-97c7-a6d845e3359e response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377152025-03-07T23:13:03.287ZINFOtest_unauthorized (external client test context): client received response status = 405
377162025-03-07T23:13:03.287ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377172025-03-07T23:13:03.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377182025-03-07T23:13:03.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 046bff22-5bdf-4429-b8d0-fc90264c8344 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377192025-03-07T23:13:03.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 046bff22-5bdf-4429-b8d0-fc90264c8344 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377202025-03-07T23:13:03.288ZINFOtest_unauthorized (external client test context): client received response status = 405
377212025-03-07T23:13:03.288ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377222025-03-07T23:13:03.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377232025-03-07T23:13:03.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 3dc4ae8d-1492-47f0-9cff-bffbb5a451ca uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377242025-03-07T23:13:03.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 3dc4ae8d-1492-47f0-9cff-bffbb5a451ca response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377252025-03-07T23:13:03.289ZINFOtest_unauthorized (external client test context): client received response status = 405
377262025-03-07T23:13:03.289ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377272025-03-07T23:13:03.289ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377282025-03-07T23:13:03.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 36593819-326b-447a-9a2f-b4fad98e6b88 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377292025-03-07T23:13:03.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 172 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 36593819-326b-447a-9a2f-b4fad98e6b88 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377302025-03-07T23:13:03.290ZINFOtest_unauthorized (external client test context): client received response status = 405
377312025-03-07T23:13:03.290ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377322025-03-07T23:13:03.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377332025-03-07T23:13:03.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377342025-03-07T23:13:03.291ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377352025-03-07T23:13:03.292ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377362025-03-07T23:13:03.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377372025-03-07T23:13:03.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377382025-03-07T23:13:03.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377392025-03-07T23:13:03.298ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
377402025-03-07T23:13:03.298ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
377412025-03-07T23:13:03.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377422025-03-07T23:13:03.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377432025-03-07T23:13:03.303ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377442025-03-07T23:13:03.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
377452025-03-07T23:13:03.319ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
377462025-03-07T23:13:03.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377472025-03-07T23:13:03.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377482025-03-07T23:13:03.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377492025-03-07T23:13:03.326ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
377502025-03-07T23:13:03.331ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
377512025-03-07T23:13:03.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377522025-03-07T23:13:03.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377532025-03-07T23:13:03.335ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377542025-03-07T23:13:03.345ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
377552025-03-07T23:13:03.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
377562025-03-07T23:13:03.350ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377572025-03-07T23:13:03.350ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377582025-03-07T23:13:03.351ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377592025-03-07T23:13:03.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
377602025-03-07T23:13:03.354ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
377612025-03-07T23:13:03.354ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377622025-03-07T23:13:03.354ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377632025-03-07T23:13:03.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377642025-03-07T23:13:03.373ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
377652025-03-07T23:13:03.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377662025-03-07T23:13:03.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377672025-03-07T23:13:03.375ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377682025-03-07T23:13:03.378ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
377692025-03-07T23:13:03.388ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
377702025-03-07T23:13:03.388ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377712025-03-07T23:13:03.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377722025-03-07T23:13:03.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377732025-03-07T23:13:03.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377742025-03-07T23:13:03.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377752025-03-07T23:13:03.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377762025-03-07T23:13:03.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377772025-03-07T23:13:03.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377782025-03-07T23:13:03.390ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377792025-03-07T23:13:03.391ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377802025-03-07T23:13:03.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377812025-03-07T23:13:03.396ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377822025-03-07T23:13:03.397ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377832025-03-07T23:13:03.397ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377842025-03-07T23:13:03.398ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377852025-03-07T23:13:03.402ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377862025-03-07T23:13:03.402ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377872025-03-07T23:13:03.402ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377882025-03-07T23:13:03.403ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377892025-03-07T23:13:03.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377902025-03-07T23:13:03.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377912025-03-07T23:13:03.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377922025-03-07T23:13:03.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377932025-03-07T23:13:03.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377942025-03-07T23:13:03.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377952025-03-07T23:13:03.469ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 177533 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 912279cb-1bb5-4150-b92a-08b0b13892ab response_code = 404 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
377962025-03-07T23:13:03.470ZINFOtest_unauthorized (external client test context): client received response status = 404
377972025-03-07T23:13:03.470ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
377982025-03-07T23:13:03.470ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
377992025-03-07T23:13:03.470ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 688c9dc9-4c5a-480a-9de5-7647b39dbf0f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378002025-03-07T23:13:03.471ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 688c9dc9-4c5a-480a-9de5-7647b39dbf0f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378012025-03-07T23:13:03.472ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 688c9dc9-4c5a-480a-9de5-7647b39dbf0f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378022025-03-07T23:13:03.472ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 688c9dc9-4c5a-480a-9de5-7647b39dbf0f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378032025-03-07T23:13:03.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 567 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 688c9dc9-4c5a-480a-9de5-7647b39dbf0f response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378042025-03-07T23:13:03.472ZINFOtest_unauthorized (external client test context): client received response status = 401
378052025-03-07T23:13:03.472ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378062025-03-07T23:13:03.472ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378072025-03-07T23:13:03.472ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b160247d-5d62-4f92-808a-f598dc607a89 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378082025-03-07T23:13:03.472ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b160247d-5d62-4f92-808a-f598dc607a89 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378092025-03-07T23:13:03.472ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b160247d-5d62-4f92-808a-f598dc607a89 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378102025-03-07T23:13:03.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 264 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b160247d-5d62-4f92-808a-f598dc607a89 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378112025-03-07T23:13:03.473ZINFOtest_unauthorized (external client test context): client received response status = 401
378122025-03-07T23:13:03.473ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378132025-03-07T23:13:03.474ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378142025-03-07T23:13:03.474ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 991bfb0b-6f2b-4ea9-b579-531c608ec784 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378152025-03-07T23:13:03.474ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 991bfb0b-6f2b-4ea9-b579-531c608ec784 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378162025-03-07T23:13:03.475ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4553:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4570:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 991bfb0b-6f2b-4ea9-b579-531c608ec784 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378172025-03-07T23:13:03.477ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1045 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 991bfb0b-6f2b-4ea9-b579-531c608ec784 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378182025-03-07T23:13:03.477ZINFOtest_unauthorized (external client test context): client received response status = 401
378192025-03-07T23:13:03.477ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378202025-03-07T23:13:03.479ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378212025-03-07T23:13:03.479ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 97123e0a-837b-409c-801a-7e4eda1966a7 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378222025-03-07T23:13:03.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 97123e0a-837b-409c-801a-7e4eda1966a7 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378232025-03-07T23:13:03.480ZINFOtest_unauthorized (external client test context): client received response status = 405
378242025-03-07T23:13:03.480ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378252025-03-07T23:13:03.480ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378262025-03-07T23:13:03.480ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = e1c601b4-03c0-4013-8da9-62492e12942a uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378272025-03-07T23:13:03.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = e1c601b4-03c0-4013-8da9-62492e12942a response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378282025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client received response status = 405
378292025-03-07T23:13:03.481ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378302025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378312025-03-07T23:13:03.481ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 9af55f1d-90b8-4279-bf5a-be3588d3821b uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378322025-03-07T23:13:03.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 9af55f1d-90b8-4279-bf5a-be3588d3821b response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378332025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client received response status = 405
378342025-03-07T23:13:03.481ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378352025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378362025-03-07T23:13:03.481ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = fd7a4add-d05c-4e42-aeb4-e564614423bb uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378372025-03-07T23:13:03.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = fd7a4add-d05c-4e42-aeb4-e564614423bb response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378382025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client received response status = 405
378392025-03-07T23:13:03.481ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378402025-03-07T23:13:03.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378412025-03-07T23:13:03.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 4e50a763-27f4-4254-8fbf-1266a0b6c027 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378422025-03-07T23:13:03.483ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 4e50a763-27f4-4254-8fbf-1266a0b6c027 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378432025-03-07T23:13:03.483ZINFOtest_unauthorized (external client test context): client received response status = 405
378442025-03-07T23:13:03.483ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378452025-03-07T23:13:03.483ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378462025-03-07T23:13:03.483ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 5675600a-7b83-4c39-bb4a-819951ac1702 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378472025-03-07T23:13:03.483ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 5675600a-7b83-4c39-bb4a-819951ac1702 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378482025-03-07T23:13:03.483ZINFOtest_unauthorized (external client test context): client received response status = 405
378492025-03-07T23:13:03.483ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378502025-03-07T23:13:03.483ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378512025-03-07T23:13:03.484ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = f7982ce0-d762-4ecf-b562-9b91a54a263c uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378522025-03-07T23:13:03.484ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = f7982ce0-d762-4ecf-b562-9b91a54a263c response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378532025-03-07T23:13:03.485ZINFOtest_unauthorized (external client test context): client received response status = 405
378542025-03-07T23:13:03.485ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378552025-03-07T23:13:03.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378562025-03-07T23:13:03.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 02b90339-9e62-48cd-bd3d-db9a30551237 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378572025-03-07T23:13:03.485ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 02b90339-9e62-48cd-bd3d-db9a30551237 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378582025-03-07T23:13:03.485ZINFOtest_unauthorized (external client test context): client received response status = 405
378592025-03-07T23:13:03.485ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/network-interfaces?project=demo-project&instance=demo-instance
378602025-03-07T23:13:03.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces?project=demo-project&instance=demo-instance
378612025-03-07T23:13:03.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378622025-03-07T23:13:03.485ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378632025-03-07T23:13:03.486ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
378642025-03-07T23:13:03.486ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378652025-03-07T23:13:03.487ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378662025-03-07T23:13:03.487ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378672025-03-07T23:13:03.487ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378682025-03-07T23:13:03.487ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378692025-03-07T23:13:03.487ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378702025-03-07T23:13:03.492ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
378712025-03-07T23:13:03.493ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
378722025-03-07T23:13:03.493ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378732025-03-07T23:13:03.493ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378742025-03-07T23:13:03.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378752025-03-07T23:13:03.497ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
378762025-03-07T23:13:03.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378772025-03-07T23:13:03.498ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378782025-03-07T23:13:03.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378792025-03-07T23:13:03.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
378802025-03-07T23:13:03.511ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
378812025-03-07T23:13:03.512ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378822025-03-07T23:13:03.512ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378832025-03-07T23:13:03.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378842025-03-07T23:13:03.514ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54098 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
378852025-03-07T23:13:03.514ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54100 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
378862025-03-07T23:13:03.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
378872025-03-07T23:13:03.560ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
378882025-03-07T23:13:03.561ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378892025-03-07T23:13:03.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378902025-03-07T23:13:03.561ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378912025-03-07T23:13:03.563ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54098 req_id = 892ce270-4490-4349-b262-8787f6c95d52 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
378922025-03-07T23:13:03.566ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54100 req_id = ca36978e-76a8-4bec-9454-1ff57eab3d90 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
378932025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54102 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
378942025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1558 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54098 req_id = 892ce270-4490-4349-b262-8787f6c95d52 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
378952025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1480 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54100 req_id = ca36978e-76a8-4bec-9454-1ff57eab3d90 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
378962025-03-07T23:13:03.566ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54102 req_id = bead97ed-ab4d-4910-82d1-9227a50d13f5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
378972025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54104 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
378982025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54106 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
378992025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54108 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
379002025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:39045 remote_addr = [::1]:54110 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
379012025-03-07T23:13:03.566ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1070 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54102 req_id = bead97ed-ab4d-4910-82d1-9227a50d13f5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379022025-03-07T23:13:03.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
379032025-03-07T23:13:03.567ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
379042025-03-07T23:13:03.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
379052025-03-07T23:13:03.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
379062025-03-07T23:13:03.568ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54104 req_id = 491e9f7a-c940-4b46-9654-a7ee8d79a1df sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379072025-03-07T23:13:03.568ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54106 req_id = d3a5c2c3-a629-49b6-9fce-bcbd7b59add6 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379082025-03-07T23:13:03.568ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54108 req_id = c8f5f03c-8038-4f70-b4a3-6abcdd7dd4c5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379092025-03-07T23:13:03.568ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:39045 method = GET remote_addr = [::1]:54110 req_id = c8ddae07-8222-4eb8-97bb-7c2382c07f38 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379102025-03-07T23:13:03.569ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 726 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54104 req_id = 491e9f7a-c940-4b46-9654-a7ee8d79a1df response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379112025-03-07T23:13:03.571ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 695 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54106 req_id = d3a5c2c3-a629-49b6-9fce-bcbd7b59add6 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379122025-03-07T23:13:03.571ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 731 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54108 req_id = c8f5f03c-8038-4f70-b4a3-6abcdd7dd4c5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379132025-03-07T23:13:03.571ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 709 local_addr = [::1]:39045 method = GET remote_addr = [::1]:54110 req_id = c8ddae07-8222-4eb8-97bb-7c2382c07f38 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
379142025-03-07T23:13:03.582ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
379152025-03-07T23:13:03.582ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379162025-03-07T23:13:03.583ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
379172025-03-07T23:13:03.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
379182025-03-07T23:13:03.588ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379192025-03-07T23:13:03.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379202025-03-07T23:13:03.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379212025-03-07T23:13:03.589ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379222025-03-07T23:13:03.590ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0657d4b6-975f-4217-804e-1ea12731f4a4 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379232025-03-07T23:13:03.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379242025-03-07T23:13:03.590ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0657d4b6-975f-4217-804e-1ea12731f4a4 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379252025-03-07T23:13:03.590ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0657d4b6-975f-4217-804e-1ea12731f4a4 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379262025-03-07T23:13:03.591ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0657d4b6-975f-4217-804e-1ea12731f4a4 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379272025-03-07T23:13:03.592ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379282025-03-07T23:13:03.599ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379292025-03-07T23:13:03.599ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379302025-03-07T23:13:03.600ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379312025-03-07T23:13:03.601ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379322025-03-07T23:13:03.602ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379332025-03-07T23:13:03.602ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379342025-03-07T23:13:03.602ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379352025-03-07T23:13:03.602ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12563 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 0657d4b6-975f-4217-804e-1ea12731f4a4 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
379362025-03-07T23:13:03.603ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0657d4b6-975f-4217-804e-1ea12731f4a4", "content-length": "405", "date": "Fri, 07 Mar 2025 23:13:03 GMT"} })
379372025-03-07T23:13:03.603ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379382025-03-07T23:13:03.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379392025-03-07T23:13:03.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379402025-03-07T23:13:03.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379412025-03-07T23:13:03.607ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = e44ce796-8104-4d18-a987-2ba30de6e2d2 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379422025-03-07T23:13:03.607ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = e44ce796-8104-4d18-a987-2ba30de6e2d2 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379432025-03-07T23:13:03.607ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = e44ce796-8104-4d18-a987-2ba30de6e2d2 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379442025-03-07T23:13:03.607ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = e44ce796-8104-4d18-a987-2ba30de6e2d2 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379452025-03-07T23:13:03.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379462025-03-07T23:13:03.608ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379472025-03-07T23:13:03.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379482025-03-07T23:13:03.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379492025-03-07T23:13:03.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379502025-03-07T23:13:03.609ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4330 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = e44ce796-8104-4d18-a987-2ba30de6e2d2 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
379512025-03-07T23:13:03.610ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e44ce796-8104-4d18-a987-2ba30de6e2d2", "content-length": "29", "date": "Fri, 07 Mar 2025 23:13:03 GMT"} })
379522025-03-07T23:13:03.610ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379532025-03-07T23:13:03.610ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379542025-03-07T23:13:03.611ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
379552025-03-07T23:13:03.617ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379562025-03-07T23:13:03.618ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379572025-03-07T23:13:03.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379582025-03-07T23:13:03.618ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379592025-03-07T23:13:03.621ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379602025-03-07T23:13:03.621ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379612025-03-07T23:13:03.621ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379622025-03-07T23:13:03.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379632025-03-07T23:13:03.629ZDEBGtest_unauthorized (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379642025-03-07T23:13:03.646ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379652025-03-07T23:13:03.646ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379662025-03-07T23:13:03.646ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = eb032708-8f54-47bb-8180-b8683602af2d uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379672025-03-07T23:13:04.240ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 609489 local_addr = 127.0.0.1:35155 method = GET remote_addr = 127.0.0.1:50232 req_id = eb032708-8f54-47bb-8180-b8683602af2d response_code = 200 uri = /cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379682025-03-07T23:13:04.241ZDEBGtest_unauthorized (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379692025-03-07T23:13:04.243ZDEBGtest_unauthorized (results-sink): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
379702025-03-07T23:13:04.243ZDEBGtest_unauthorized (results-sink-cluster): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
379712025-03-07T23:13:04.244ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379722025-03-07T23:13:04.244ZDEBGtest_unauthorized (clickhouse-client): unrolling 2 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
379732025-03-07T23:13:04.245ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
379742025-03-07T23:13:04.245ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric', 'virtual_machine:check') FORMAT Native;
379752025-03-07T23:13:04.778ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379762025-03-07T23:13:04.779ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379772025-03-07T23:13:04.779ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
379782025-03-07T23:13:04.781ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379792025-03-07T23:13:04.790ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379802025-03-07T23:13:04.790ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379812025-03-07T23:13:04.790ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379822025-03-07T23:13:04.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379832025-03-07T23:13:04.799ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379842025-03-07T23:13:04.800ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379852025-03-07T23:13:04.800ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
379862025-03-07T23:13:04.800ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:13:04.245045749Z } timeseries_name = oximeter_collector:collections
379872025-03-07T23:13:04.800ZDEBGtest_unauthorized (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
379882025-03-07T23:13:04.809ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
379892025-03-07T23:13:04.810ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379902025-03-07T23:13:04.811ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
379912025-03-07T23:13:04.811ZDEBGtest_unauthorized (results-sink-cluster): inserting 356 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
379922025-03-07T23:13:04.811ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379932025-03-07T23:13:04.811ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379942025-03-07T23:13:04.811ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379952025-03-07T23:13:04.811ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379962025-03-07T23:13:04.811ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
379972025-03-07T23:13:04.811ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379982025-03-07T23:13:04.812ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379992025-03-07T23:13:04.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380002025-03-07T23:13:04.812ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380012025-03-07T23:13:04.812ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
380022025-03-07T23:13:04.820ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380032025-03-07T23:13:04.820ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380042025-03-07T23:13:04.820ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380052025-03-07T23:13:04.821ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380062025-03-07T23:13:04.822ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_ipaddr
380072025-03-07T23:13:04.822ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 3 sql = INSERT INTO oximeter.fields_string FORMAT Native
380082025-03-07T23:13:04.836ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380092025-03-07T23:13:04.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380102025-03-07T23:13:04.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380112025-03-07T23:13:04.851ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380122025-03-07T23:13:04.852ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380132025-03-07T23:13:04.853ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 3 table_name = fields_string
380142025-03-07T23:13:04.853ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
380152025-03-07T23:13:04.872ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1392363 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7f61734d-0e0f-4017-80bc-09876c8b800f response_code = 200 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380162025-03-07T23:13:04.873ZINFOtest_unauthorized (external client test context): client received response status = 200
380172025-03-07T23:13:04.873ZINFOtest_unauthorized: test: begin endpoint url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380182025-03-07T23:13:04.873ZINFOtest_unauthorized: test: privileged GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380192025-03-07T23:13:04.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380202025-03-07T23:13:04.878ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_u16
380212025-03-07T23:13:04.880ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
380222025-03-07T23:13:04.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380232025-03-07T23:13:04.880ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380242025-03-07T23:13:04.880ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380252025-03-07T23:13:04.880ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380262025-03-07T23:13:04.880ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380272025-03-07T23:13:04.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380282025-03-07T23:13:04.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380292025-03-07T23:13:04.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380302025-03-07T23:13:04.885ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380312025-03-07T23:13:04.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
380322025-03-07T23:13:04.893ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
380332025-03-07T23:13:04.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380342025-03-07T23:13:04.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380352025-03-07T23:13:04.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380362025-03-07T23:13:04.896ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
380372025-03-07T23:13:04.900ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_uuid
380382025-03-07T23:13:04.901ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
380392025-03-07T23:13:04.906ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
380402025-03-07T23:13:04.906ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380412025-03-07T23:13:04.907ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380422025-03-07T23:13:04.907ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380432025-03-07T23:13:04.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
380442025-03-07T23:13:04.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
380452025-03-07T23:13:04.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380462025-03-07T23:13:04.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380472025-03-07T23:13:04.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380482025-03-07T23:13:04.920ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_cumulativeu64
380492025-03-07T23:13:04.920ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
380502025-03-07T23:13:04.921ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
380512025-03-07T23:13:04.922ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
380522025-03-07T23:13:04.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380532025-03-07T23:13:04.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380542025-03-07T23:13:04.923ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380552025-03-07T23:13:04.925ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
380562025-03-07T23:13:04.927ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
380572025-03-07T23:13:04.927ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
380582025-03-07T23:13:04.927ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
380592025-03-07T23:13:04.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380602025-03-07T23:13:04.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380612025-03-07T23:13:04.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380622025-03-07T23:13:04.927ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
380632025-03-07T23:13:04.927ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
380642025-03-07T23:13:04.927ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
380652025-03-07T23:13:04.927ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
380662025-03-07T23:13:04.927ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
380672025-03-07T23:13:04.927ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
380682025-03-07T23:13:04.930ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
380692025-03-07T23:13:04.936ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
380702025-03-07T23:13:04.936ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380712025-03-07T23:13:04.936ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380722025-03-07T23:13:04.936ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380732025-03-07T23:13:04.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380742025-03-07T23:13:04.937ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 1 table_name = measurements_i64
380752025-03-07T23:13:04.937ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380762025-03-07T23:13:04.937ZDEBGtest_unauthorized (results-sink): inserting 356 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380772025-03-07T23:13:04.937ZDEBGtest_unauthorized (clickhouse-client): unrolling 356 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
380782025-03-07T23:13:05.299ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 3 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
380792025-03-07T23:13:05.300ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380802025-03-07T23:13:05.302ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380812025-03-07T23:13:05.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380822025-03-07T23:13:05.303ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380832025-03-07T23:13:05.308ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 3 table_name = fields_ipaddr
380842025-03-07T23:13:05.308ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 711 sql = INSERT INTO oximeter.fields_string FORMAT Native
380852025-03-07T23:13:05.308ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380862025-03-07T23:13:05.309ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380872025-03-07T23:13:05.311ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380882025-03-07T23:13:05.317ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380892025-03-07T23:13:05.317ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380902025-03-07T23:13:05.318ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380912025-03-07T23:13:05.320ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 711 table_name = fields_string
380922025-03-07T23:13:05.321ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 357 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
380932025-03-07T23:13:05.324ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380942025-03-07T23:13:05.324ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380952025-03-07T23:13:05.324ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380962025-03-07T23:13:05.325ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380972025-03-07T23:13:05.326ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
380982025-03-07T23:13:05.327ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 357 table_name = fields_u16
380992025-03-07T23:13:05.328ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 363 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
381002025-03-07T23:13:05.330ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381012025-03-07T23:13:05.331ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381022025-03-07T23:13:05.331ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381032025-03-07T23:13:05.333ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381042025-03-07T23:13:05.338ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381052025-03-07T23:13:05.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381062025-03-07T23:13:05.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381072025-03-07T23:13:05.342ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381082025-03-07T23:13:05.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381092025-03-07T23:13:05.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381102025-03-07T23:13:05.355ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 477017 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = b1f29f31-5b4c-4c98-a50c-dea2d85c8f9d response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381112025-03-07T23:13:05.356ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 363 table_name = fields_uuid
381122025-03-07T23:13:05.357ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 5 n_rows = 2 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
381132025-03-07T23:13:05.357ZINFOtest_unauthorized (external client test context): client received response status = 200
381142025-03-07T23:13:05.357ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381152025-03-07T23:13:05.357ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381162025-03-07T23:13:05.357ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381172025-03-07T23:13:05.358ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381182025-03-07T23:13:05.358ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381192025-03-07T23:13:05.362ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381202025-03-07T23:13:05.363ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381212025-03-07T23:13:05.364ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381222025-03-07T23:13:05.366ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = measurements_cumulativeu64
381232025-03-07T23:13:05.368ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 19 n_rows = 354 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
381242025-03-07T23:13:05.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381252025-03-07T23:13:05.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381262025-03-07T23:13:05.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381272025-03-07T23:13:05.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
381282025-03-07T23:13:05.396ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
381292025-03-07T23:13:05.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381302025-03-07T23:13:05.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381312025-03-07T23:13:05.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381322025-03-07T23:13:05.401ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
381332025-03-07T23:13:05.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381342025-03-07T23:13:05.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381352025-03-07T23:13:05.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381362025-03-07T23:13:05.405ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 354 table_name = measurements_histogramu64
381372025-03-07T23:13:05.405ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
381382025-03-07T23:13:05.408ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
381392025-03-07T23:13:05.409ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
381402025-03-07T23:13:05.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
381412025-03-07T23:13:05.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381422025-03-07T23:13:05.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381432025-03-07T23:13:05.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381442025-03-07T23:13:05.415ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
381452025-03-07T23:13:05.420ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
381462025-03-07T23:13:05.420ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
381472025-03-07T23:13:05.420ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381482025-03-07T23:13:05.420ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381492025-03-07T23:13:05.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381502025-03-07T23:13:05.430ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
381512025-03-07T23:13:05.432ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381522025-03-07T23:13:05.432ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381532025-03-07T23:13:05.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381542025-03-07T23:13:05.437ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
381552025-03-07T23:13:05.441ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
381562025-03-07T23:13:05.454ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381572025-03-07T23:13:05.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381582025-03-07T23:13:05.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381592025-03-07T23:13:05.455ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381602025-03-07T23:13:05.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381612025-03-07T23:13:05.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381622025-03-07T23:13:05.455ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381632025-03-07T23:13:05.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381642025-03-07T23:13:05.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381652025-03-07T23:13:05.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381662025-03-07T23:13:05.464ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381672025-03-07T23:13:05.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381682025-03-07T23:13:05.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381692025-03-07T23:13:05.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381702025-03-07T23:13:05.473ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381712025-03-07T23:13:05.473ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381722025-03-07T23:13:05.473ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381732025-03-07T23:13:05.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381742025-03-07T23:13:05.478ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381752025-03-07T23:13:05.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381762025-03-07T23:13:05.479ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381772025-03-07T23:13:05.480ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381782025-03-07T23:13:05.482ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381792025-03-07T23:13:05.484ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381802025-03-07T23:13:05.484ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381812025-03-07T23:13:05.484ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381822025-03-07T23:13:05.499ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381832025-03-07T23:13:05.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381842025-03-07T23:13:05.528ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 170227 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 486069e9-a703-42b0-81e6-23f546a493a5 response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381852025-03-07T23:13:05.528ZINFOtest_unauthorized (external client test context): client received response status = 404
381862025-03-07T23:13:05.529ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381872025-03-07T23:13:05.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381882025-03-07T23:13:05.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8a52e8b5-8412-4362-a3dd-5be6b88a5dc1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381892025-03-07T23:13:05.530ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8a52e8b5-8412-4362-a3dd-5be6b88a5dc1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381902025-03-07T23:13:05.530ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8a52e8b5-8412-4362-a3dd-5be6b88a5dc1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381912025-03-07T23:13:05.530ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8a52e8b5-8412-4362-a3dd-5be6b88a5dc1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381922025-03-07T23:13:05.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 640 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8a52e8b5-8412-4362-a3dd-5be6b88a5dc1 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381932025-03-07T23:13:05.532ZINFOtest_unauthorized (external client test context): client received response status = 401
381942025-03-07T23:13:05.532ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381952025-03-07T23:13:05.532ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381962025-03-07T23:13:05.532ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e89d60ac-5b30-448e-b8f7-04f4fe85706a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381972025-03-07T23:13:05.533ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e89d60ac-5b30-448e-b8f7-04f4fe85706a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381982025-03-07T23:13:05.533ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e89d60ac-5b30-448e-b8f7-04f4fe85706a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
381992025-03-07T23:13:05.533ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 691 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e89d60ac-5b30-448e-b8f7-04f4fe85706a response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382002025-03-07T23:13:05.533ZINFOtest_unauthorized (external client test context): client received response status = 401
382012025-03-07T23:13:05.534ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382022025-03-07T23:13:05.534ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382032025-03-07T23:13:05.534ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 26683305-521e-4876-acb0-0a2035cca61e uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382042025-03-07T23:13:05.534ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 26683305-521e-4876-acb0-0a2035cca61e uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382052025-03-07T23:13:05.537ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4614:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4633:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 26683305-521e-4876-acb0-0a2035cca61e uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382062025-03-07T23:13:05.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2949 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 26683305-521e-4876-acb0-0a2035cca61e response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382072025-03-07T23:13:05.538ZINFOtest_unauthorized (external client test context): client received response status = 401
382082025-03-07T23:13:05.538ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382092025-03-07T23:13:05.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382102025-03-07T23:13:05.539ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382112025-03-07T23:13:05.539ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382122025-03-07T23:13:05.539ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382132025-03-07T23:13:05.539ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382142025-03-07T23:13:05.540ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382152025-03-07T23:13:05.541ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382162025-03-07T23:13:05.558ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382172025-03-07T23:13:05.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382182025-03-07T23:13:05.563ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382192025-03-07T23:13:05.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
382202025-03-07T23:13:05.571ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
382212025-03-07T23:13:05.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382222025-03-07T23:13:05.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382232025-03-07T23:13:05.571ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382242025-03-07T23:13:05.571ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
382252025-03-07T23:13:05.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382262025-03-07T23:13:05.572ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382272025-03-07T23:13:05.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382282025-03-07T23:13:05.574ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
382292025-03-07T23:13:05.575ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382302025-03-07T23:13:05.577ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 70cbc052-6332-40ed-be56-54109d6f09cc uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382312025-03-07T23:13:05.577ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 70cbc052-6332-40ed-be56-54109d6f09cc resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382322025-03-07T23:13:05.577ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 70cbc052-6332-40ed-be56-54109d6f09cc roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382332025-03-07T23:13:05.577ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 70cbc052-6332-40ed-be56-54109d6f09cc resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382342025-03-07T23:13:05.577ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
382352025-03-07T23:13:05.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
382362025-03-07T23:13:05.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382372025-03-07T23:13:05.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382382025-03-07T23:13:05.582ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382392025-03-07T23:13:05.585ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9429 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = 70cbc052-6332-40ed-be56-54109d6f09cc response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
382402025-03-07T23:13:05.586ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "70cbc052-6332-40ed-be56-54109d6f09cc", "content-length": "405", "date": "Fri, 07 Mar 2025 23:13:04 GMT"} })
382412025-03-07T23:13:05.586ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382422025-03-07T23:13:05.587ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
382432025-03-07T23:13:05.588ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
382442025-03-07T23:13:05.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382452025-03-07T23:13:05.588ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382462025-03-07T23:13:05.588ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382472025-03-07T23:13:05.588ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382482025-03-07T23:13:05.590ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382492025-03-07T23:13:05.590ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382502025-03-07T23:13:05.590ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382512025-03-07T23:13:05.590ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382522025-03-07T23:13:05.590ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382532025-03-07T23:13:05.592ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
382542025-03-07T23:13:05.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382552025-03-07T23:13:05.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382562025-03-07T23:13:05.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382572025-03-07T23:13:05.595ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382582025-03-07T23:13:05.596ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382592025-03-07T23:13:05.596ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382602025-03-07T23:13:05.596ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382612025-03-07T23:13:05.597ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8097 local_addr = 127.0.0.1:43523 method = GET remote_addr = 127.0.0.1:38990 req_id = aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D
382622025-03-07T23:13:05.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
382632025-03-07T23:13:05.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
382642025-03-07T23:13:05.605ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382652025-03-07T23:13:05.605ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382662025-03-07T23:13:05.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382672025-03-07T23:13:05.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382682025-03-07T23:13:05.614ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:43523/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJjZWRkMzhjNC0yZjE1LTRhNzYtOTFlMy05ZDRiYzQ5MTkxYTgifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "aeb69e04-8b5a-4ba9-a0d1-f2cd161d210f", "content-length": "29", "date": "Fri, 07 Mar 2025 23:13:04 GMT"} })
382692025-03-07T23:13:05.614ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
382702025-03-07T23:13:05.614ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = cedd38c4-2f15-4a76-91e3-9d4bc49191a8
382712025-03-07T23:13:05.615ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
382722025-03-07T23:13:05.615ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382732025-03-07T23:13:05.615ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382742025-03-07T23:13:05.616ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382752025-03-07T23:13:05.619ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382762025-03-07T23:13:05.620ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382772025-03-07T23:13:05.620ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382782025-03-07T23:13:05.628ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382792025-03-07T23:13:05.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382802025-03-07T23:13:05.629ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382812025-03-07T23:13:05.639ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382822025-03-07T23:13:05.640ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382832025-03-07T23:13:05.640ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382842025-03-07T23:13:05.640ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382852025-03-07T23:13:05.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382862025-03-07T23:13:05.643ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382872025-03-07T23:13:05.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382882025-03-07T23:13:05.646ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382892025-03-07T23:13:05.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382902025-03-07T23:13:05.649ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382912025-03-07T23:13:05.650ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382922025-03-07T23:13:05.650ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382932025-03-07T23:13:05.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382942025-03-07T23:13:05.669ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382952025-03-07T23:13:05.727ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382962025-03-07T23:13:05.729ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 188747 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 610585a2-58b6-480d-a83f-7ad2a91da8db response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382972025-03-07T23:13:05.729ZINFOtest_unauthorized (external client test context): client received response status = 404
382982025-03-07T23:13:05.729ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
382992025-03-07T23:13:05.729ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383002025-03-07T23:13:05.730ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 234e018a-83ca-4284-9023-0dfeeed58c7c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383012025-03-07T23:13:05.733ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 234e018a-83ca-4284-9023-0dfeeed58c7c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383022025-03-07T23:13:05.733ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 234e018a-83ca-4284-9023-0dfeeed58c7c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383032025-03-07T23:13:05.733ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 234e018a-83ca-4284-9023-0dfeeed58c7c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383042025-03-07T23:13:05.733ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1174 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 234e018a-83ca-4284-9023-0dfeeed58c7c response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383052025-03-07T23:13:05.736ZINFOtest_unauthorized (external client test context): client received response status = 401
383062025-03-07T23:13:05.737ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383072025-03-07T23:13:05.737ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383082025-03-07T23:13:05.737ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = ddd1ee66-8c41-4206-9372-2937420bf423 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383092025-03-07T23:13:05.737ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = ddd1ee66-8c41-4206-9372-2937420bf423 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383102025-03-07T23:13:05.738ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = ddd1ee66-8c41-4206-9372-2937420bf423 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383112025-03-07T23:13:05.738ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 431 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = ddd1ee66-8c41-4206-9372-2937420bf423 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383122025-03-07T23:13:05.739ZINFOtest_unauthorized (external client test context): client received response status = 401
383132025-03-07T23:13:05.739ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383142025-03-07T23:13:05.739ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383152025-03-07T23:13:05.741ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = e5b4a038-4d94-455d-8898-1f7dea5364f6 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383162025-03-07T23:13:05.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = e5b4a038-4d94-455d-8898-1f7dea5364f6 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383172025-03-07T23:13:05.742ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4645:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4674:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = e5b4a038-4d94-455d-8898-1f7dea5364f6 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383182025-03-07T23:13:05.742ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1083 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = e5b4a038-4d94-455d-8898-1f7dea5364f6 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383192025-03-07T23:13:05.745ZINFOtest_unauthorized (external client test context): client received response status = 401
383202025-03-07T23:13:05.746ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383212025-03-07T23:13:05.746ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383222025-03-07T23:13:05.747ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 738eb4b9-0e8d-4c8b-b681-57d296b7334c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383232025-03-07T23:13:05.747ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 738eb4b9-0e8d-4c8b-b681-57d296b7334c response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383242025-03-07T23:13:05.747ZINFOtest_unauthorized (external client test context): client received response status = 405
383252025-03-07T23:13:05.747ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383262025-03-07T23:13:05.747ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383272025-03-07T23:13:05.747ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 687f2a93-eb8f-405c-a332-ce6ff92873a1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383282025-03-07T23:13:05.747ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 687f2a93-eb8f-405c-a332-ce6ff92873a1 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383292025-03-07T23:13:05.747ZINFOtest_unauthorized (external client test context): client received response status = 405
383302025-03-07T23:13:05.747ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383312025-03-07T23:13:05.747ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383322025-03-07T23:13:05.748ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = a045da3f-14d1-41ba-8c10-df9432101eeb uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383332025-03-07T23:13:05.748ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = a045da3f-14d1-41ba-8c10-df9432101eeb response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383342025-03-07T23:13:05.748ZINFOtest_unauthorized (external client test context): client received response status = 405
383352025-03-07T23:13:05.748ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383362025-03-07T23:13:05.748ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383372025-03-07T23:13:05.748ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 049ea1ed-ffaf-4f6e-af55-97157c4455c1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383382025-03-07T23:13:05.748ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 165 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 049ea1ed-ffaf-4f6e-af55-97157c4455c1 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383392025-03-07T23:13:05.749ZINFOtest_unauthorized (external client test context): client received response status = 405
383402025-03-07T23:13:05.749ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383412025-03-07T23:13:05.749ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383422025-03-07T23:13:05.749ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383432025-03-07T23:13:05.750ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383442025-03-07T23:13:05.750ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383452025-03-07T23:13:05.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383462025-03-07T23:13:05.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383472025-03-07T23:13:05.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383482025-03-07T23:13:05.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383492025-03-07T23:13:05.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383502025-03-07T23:13:05.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383512025-03-07T23:13:05.760ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
383522025-03-07T23:13:05.760ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
383532025-03-07T23:13:05.760ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383542025-03-07T23:13:05.760ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383552025-03-07T23:13:05.761ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383562025-03-07T23:13:05.770ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
383572025-03-07T23:13:05.771ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383582025-03-07T23:13:05.771ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383592025-03-07T23:13:05.771ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383602025-03-07T23:13:05.775ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
383612025-03-07T23:13:05.780ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
383622025-03-07T23:13:05.780ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383632025-03-07T23:13:05.780ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383642025-03-07T23:13:05.781ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383652025-03-07T23:13:05.794ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
383662025-03-07T23:13:05.796ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
383672025-03-07T23:13:05.796ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383682025-03-07T23:13:05.796ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383692025-03-07T23:13:05.796ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383702025-03-07T23:13:05.806ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
383712025-03-07T23:13:05.811ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383722025-03-07T23:13:05.811ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383732025-03-07T23:13:05.811ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383742025-03-07T23:13:05.811ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
383752025-03-07T23:13:05.814ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
383762025-03-07T23:13:05.816ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383772025-03-07T23:13:05.816ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383782025-03-07T23:13:05.816ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383792025-03-07T23:13:05.816ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383802025-03-07T23:13:05.817ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383812025-03-07T23:13:05.817ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383822025-03-07T23:13:05.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383832025-03-07T23:13:05.820ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383842025-03-07T23:13:05.823ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383852025-03-07T23:13:05.823ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383862025-03-07T23:13:05.825ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383872025-03-07T23:13:05.826ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383882025-03-07T23:13:05.826ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383892025-03-07T23:13:05.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383902025-03-07T23:13:05.832ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383912025-03-07T23:13:05.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383922025-03-07T23:13:05.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383932025-03-07T23:13:05.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383942025-03-07T23:13:05.841ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383952025-03-07T23:13:05.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383962025-03-07T23:13:05.843ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383972025-03-07T23:13:05.843ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383982025-03-07T23:13:05.851ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383992025-03-07T23:13:05.852ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384002025-03-07T23:13:05.852ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384012025-03-07T23:13:05.853ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384022025-03-07T23:13:05.856ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384032025-03-07T23:13:05.886ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384042025-03-07T23:13:05.886ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 131957 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 05a4ce14-843f-4082-9997-44fa7c6ca2bb response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384052025-03-07T23:13:05.886ZINFOtest_unauthorized (external client test context): client received response status = 404
384062025-03-07T23:13:05.886ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384072025-03-07T23:13:05.886ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384082025-03-07T23:13:05.886ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 60b5f7df-228f-426f-9177-8933a69d9090 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384092025-03-07T23:13:05.886ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 60b5f7df-228f-426f-9177-8933a69d9090 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384102025-03-07T23:13:05.886ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 60b5f7df-228f-426f-9177-8933a69d9090 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384112025-03-07T23:13:05.886ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 60b5f7df-228f-426f-9177-8933a69d9090 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384122025-03-07T23:13:05.886ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 334 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 60b5f7df-228f-426f-9177-8933a69d9090 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384132025-03-07T23:13:05.886ZINFOtest_unauthorized (external client test context): client received response status = 401
384142025-03-07T23:13:05.887ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384152025-03-07T23:13:05.887ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384162025-03-07T23:13:05.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4c816d6f-61e9-415c-a39b-bbc2b2d786e5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384172025-03-07T23:13:05.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4c816d6f-61e9-415c-a39b-bbc2b2d786e5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384182025-03-07T23:13:05.888ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4c816d6f-61e9-415c-a39b-bbc2b2d786e5 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384192025-03-07T23:13:05.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 178 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4c816d6f-61e9-415c-a39b-bbc2b2d786e5 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384202025-03-07T23:13:05.888ZINFOtest_unauthorized (external client test context): client received response status = 401
384212025-03-07T23:13:05.888ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384222025-03-07T23:13:05.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384232025-03-07T23:13:05.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 27f2f60b-c7ed-4d0b-93c5-2a1191a300b1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384242025-03-07T23:13:05.889ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 27f2f60b-c7ed-4d0b-93c5-2a1191a300b1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384252025-03-07T23:13:05.891ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4581:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4603:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 27f2f60b-c7ed-4d0b-93c5-2a1191a300b1 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384262025-03-07T23:13:05.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 752 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 27f2f60b-c7ed-4d0b-93c5-2a1191a300b1 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384272025-03-07T23:13:05.891ZINFOtest_unauthorized (external client test context): client received response status = 401
384282025-03-07T23:13:05.891ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384292025-03-07T23:13:05.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384302025-03-07T23:13:05.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = d721ae74-fd84-412c-9f3c-3ad531711e5c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384312025-03-07T23:13:05.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = d721ae74-fd84-412c-9f3c-3ad531711e5c response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384322025-03-07T23:13:05.891ZINFOtest_unauthorized (external client test context): client received response status = 405
384332025-03-07T23:13:05.891ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384342025-03-07T23:13:05.894ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384352025-03-07T23:13:05.894ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = deb274ac-9276-49aa-a4b9-1a13625e017b uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384362025-03-07T23:13:05.895ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = deb274ac-9276-49aa-a4b9-1a13625e017b response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384372025-03-07T23:13:05.896ZINFOtest_unauthorized (external client test context): client received response status = 405
384382025-03-07T23:13:05.896ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384392025-03-07T23:13:05.896ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384402025-03-07T23:13:05.897ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = b684a053-76c5-4e2a-8f3f-f93532f78e88 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384412025-03-07T23:13:05.897ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = b684a053-76c5-4e2a-8f3f-f93532f78e88 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384422025-03-07T23:13:05.897ZINFOtest_unauthorized (external client test context): client received response status = 405
384432025-03-07T23:13:05.897ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384442025-03-07T23:13:05.897ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384452025-03-07T23:13:05.897ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 44773c56-64c3-4942-a6fc-a05173c9acab uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384462025-03-07T23:13:05.897ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 44773c56-64c3-4942-a6fc-a05173c9acab response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384472025-03-07T23:13:05.897ZINFOtest_unauthorized (external client test context): client received response status = 405
384482025-03-07T23:13:05.897ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384492025-03-07T23:13:05.897ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384502025-03-07T23:13:05.897ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384512025-03-07T23:13:05.897ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384522025-03-07T23:13:05.897ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384532025-03-07T23:13:05.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384542025-03-07T23:13:05.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384552025-03-07T23:13:05.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384562025-03-07T23:13:05.898ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384572025-03-07T23:13:05.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384582025-03-07T23:13:05.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384592025-03-07T23:13:05.898ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
384602025-03-07T23:13:05.898ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384612025-03-07T23:13:05.899ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384622025-03-07T23:13:05.900ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384632025-03-07T23:13:05.901ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384642025-03-07T23:13:05.913ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384652025-03-07T23:13:05.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384662025-03-07T23:13:05.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384672025-03-07T23:13:05.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384682025-03-07T23:13:05.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384692025-03-07T23:13:05.921ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
384702025-03-07T23:13:05.921ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384712025-03-07T23:13:05.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384722025-03-07T23:13:05.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384732025-03-07T23:13:05.924ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
384742025-03-07T23:13:05.925ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384752025-03-07T23:13:05.925ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384762025-03-07T23:13:05.925ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384772025-03-07T23:13:05.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384782025-03-07T23:13:05.928ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384792025-03-07T23:13:05.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384802025-03-07T23:13:05.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384812025-03-07T23:13:05.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384822025-03-07T23:13:05.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384832025-03-07T23:13:05.936ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
384842025-03-07T23:13:05.938ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384852025-03-07T23:13:05.938ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384862025-03-07T23:13:05.938ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384872025-03-07T23:13:05.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384882025-03-07T23:13:05.942ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384892025-03-07T23:13:05.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384902025-03-07T23:13:05.944ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384912025-03-07T23:13:05.946ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384922025-03-07T23:13:05.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384932025-03-07T23:13:05.958ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384942025-03-07T23:13:05.958ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384952025-03-07T23:13:05.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384962025-03-07T23:13:05.958ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384972025-03-07T23:13:05.958ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384982025-03-07T23:13:05.959ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384992025-03-07T23:13:05.959ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385002025-03-07T23:13:05.959ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385012025-03-07T23:13:05.959ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385022025-03-07T23:13:05.962ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385032025-03-07T23:13:05.962ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385042025-03-07T23:13:05.963ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385052025-03-07T23:13:05.963ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385062025-03-07T23:13:05.969ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385072025-03-07T23:13:05.969ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385082025-03-07T23:13:05.969ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385092025-03-07T23:13:05.972ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385102025-03-07T23:13:05.977ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385112025-03-07T23:13:05.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") }, key: 82888c06-1920-48a3-9e72-2ad13a44d89e, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385122025-03-07T23:13:05.987ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 99325 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7574cc6c-d1e0-47ff-9d4e-ea3e436f1da9 response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385132025-03-07T23:13:05.988ZINFOtest_unauthorized (external client test context): client received response status = 200
385142025-03-07T23:13:05.990ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/external-ips?project=demo-project
385152025-03-07T23:13:05.990ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/external-ips?project=demo-project
385162025-03-07T23:13:05.991ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
385172025-03-07T23:13:05.991ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385182025-03-07T23:13:05.991ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385192025-03-07T23:13:05.991ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385202025-03-07T23:13:05.991ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385212025-03-07T23:13:05.991ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385222025-03-07T23:13:05.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385232025-03-07T23:13:06.013ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385242025-03-07T23:13:06.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385252025-03-07T23:13:06.015ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385262025-03-07T23:13:06.018ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
385272025-03-07T23:13:06.018ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
385282025-03-07T23:13:06.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385292025-03-07T23:13:06.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385302025-03-07T23:13:06.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385312025-03-07T23:13:06.023ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
385322025-03-07T23:13:06.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385332025-03-07T23:13:06.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385342025-03-07T23:13:06.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385352025-03-07T23:13:06.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
385362025-03-07T23:13:06.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
385372025-03-07T23:13:06.038ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385382025-03-07T23:13:06.038ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385392025-03-07T23:13:06.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385402025-03-07T23:13:06.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
385412025-03-07T23:13:06.050ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
385422025-03-07T23:13:06.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385432025-03-07T23:13:06.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385442025-03-07T23:13:06.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385452025-03-07T23:13:06.051ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
385462025-03-07T23:13:06.051ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385472025-03-07T23:13:06.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385482025-03-07T23:13:06.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385492025-03-07T23:13:06.052ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
385502025-03-07T23:13:06.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
385512025-03-07T23:13:06.058ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385522025-03-07T23:13:06.058ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385532025-03-07T23:13:06.060ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385542025-03-07T23:13:06.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385552025-03-07T23:13:06.064ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385562025-03-07T23:13:06.064ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385572025-03-07T23:13:06.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385582025-03-07T23:13:06.064ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385592025-03-07T23:13:06.064ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385602025-03-07T23:13:06.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385612025-03-07T23:13:06.067ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385622025-03-07T23:13:06.068ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
385632025-03-07T23:13:06.068ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385642025-03-07T23:13:06.068ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385652025-03-07T23:13:06.068ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385662025-03-07T23:13:06.070ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
385672025-03-07T23:13:06.070ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385682025-03-07T23:13:06.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385692025-03-07T23:13:06.072ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385702025-03-07T23:13:06.076ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
385712025-03-07T23:13:06.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385722025-03-07T23:13:06.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385732025-03-07T23:13:06.077ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385742025-03-07T23:13:06.082ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385752025-03-07T23:13:06.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385762025-03-07T23:13:06.091ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
385772025-03-07T23:13:06.091ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
385782025-03-07T23:13:06.092ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
385792025-03-07T23:13:06.105ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 112787 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 5c4fcd6a-5753-420a-9162-85d89e462825 response_code = 200 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385802025-03-07T23:13:06.105ZINFOtest_unauthorized (external client test context): client received response status = 200
385812025-03-07T23:13:06.107ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
385822025-03-07T23:13:06.108ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
385832025-03-07T23:13:06.112ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da uri = /v1/instances/demo-instance/external-ips?project=demo-project
385842025-03-07T23:13:06.114ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da uri = /v1/instances/demo-instance/external-ips?project=demo-project
385852025-03-07T23:13:06.114ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips?project=demo-project
385862025-03-07T23:13:06.114ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385872025-03-07T23:13:06.114ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385882025-03-07T23:13:06.114ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385892025-03-07T23:13:06.114ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385902025-03-07T23:13:06.114ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385912025-03-07T23:13:06.114ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385922025-03-07T23:13:06.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
385932025-03-07T23:13:06.116ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
385942025-03-07T23:13:06.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385952025-03-07T23:13:06.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385962025-03-07T23:13:06.121ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385972025-03-07T23:13:06.121ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
385982025-03-07T23:13:06.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385992025-03-07T23:13:06.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386002025-03-07T23:13:06.121ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386012025-03-07T23:13:06.123ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
386022025-03-07T23:13:06.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
386032025-03-07T23:13:06.134ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386042025-03-07T23:13:06.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386052025-03-07T23:13:06.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386062025-03-07T23:13:06.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
386072025-03-07T23:13:06.138ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
386082025-03-07T23:13:06.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386092025-03-07T23:13:06.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386102025-03-07T23:13:06.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386112025-03-07T23:13:06.143ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
386122025-03-07T23:13:06.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386132025-03-07T23:13:06.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386142025-03-07T23:13:06.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386152025-03-07T23:13:06.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
386162025-03-07T23:13:06.150ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
386172025-03-07T23:13:06.150ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da uri = /v1/instances/demo-instance/external-ips?project=demo-project
386182025-03-07T23:13:06.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386192025-03-07T23:13:06.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386202025-03-07T23:13:06.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386212025-03-07T23:13:06.154ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386222025-03-07T23:13:06.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386232025-03-07T23:13:06.156ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386242025-03-07T23:13:06.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386252025-03-07T23:13:06.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386262025-03-07T23:13:06.159ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386272025-03-07T23:13:06.162ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386282025-03-07T23:13:06.162ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
386292025-03-07T23:13:06.162ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386302025-03-07T23:13:06.162ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386312025-03-07T23:13:06.163ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386322025-03-07T23:13:06.166ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
386332025-03-07T23:13:06.170ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386342025-03-07T23:13:06.170ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386352025-03-07T23:13:06.171ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386362025-03-07T23:13:06.175ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
386372025-03-07T23:13:06.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
386382025-03-07T23:13:06.177ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386392025-03-07T23:13:06.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386402025-03-07T23:13:06.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
386412025-03-07T23:13:06.192ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips?project=demo-project
386422025-03-07T23:13:06.192ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 90267 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 54cd48a1-192d-4b0a-ac52-a080536da5da response_code = 404 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386432025-03-07T23:13:06.193ZINFOtest_unauthorized (external client test context): client received response status = 404
386442025-03-07T23:13:06.194ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
386452025-03-07T23:13:06.194ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386462025-03-07T23:13:06.194ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7b1f8d6b-c1c2-460d-bf85-63a3fd5e32b0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386472025-03-07T23:13:06.195ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7b1f8d6b-c1c2-460d-bf85-63a3fd5e32b0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386482025-03-07T23:13:06.195ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7b1f8d6b-c1c2-460d-bf85-63a3fd5e32b0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386492025-03-07T23:13:06.195ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7b1f8d6b-c1c2-460d-bf85-63a3fd5e32b0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386502025-03-07T23:13:06.195ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 856 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 7b1f8d6b-c1c2-460d-bf85-63a3fd5e32b0 response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386512025-03-07T23:13:06.195ZINFOtest_unauthorized (external client test context): client received response status = 401
386522025-03-07T23:13:06.197ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
386532025-03-07T23:13:06.197ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386542025-03-07T23:13:06.197ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = c5f2ddc6-5109-4b5b-bbaa-2d7e406c7bc3 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386552025-03-07T23:13:06.197ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = c5f2ddc6-5109-4b5b-bbaa-2d7e406c7bc3 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386562025-03-07T23:13:06.197ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = c5f2ddc6-5109-4b5b-bbaa-2d7e406c7bc3 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386572025-03-07T23:13:06.197ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 222 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = c5f2ddc6-5109-4b5b-bbaa-2d7e406c7bc3 response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386582025-03-07T23:13:06.197ZINFOtest_unauthorized (external client test context): client received response status = 401
386592025-03-07T23:13:06.197ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
386602025-03-07T23:13:06.198ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386612025-03-07T23:13:06.198ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48c27dd1-70d3-410d-819f-b2111d5875e9 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386622025-03-07T23:13:06.198ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48c27dd1-70d3-410d-819f-b2111d5875e9 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386632025-03-07T23:13:06.200ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4690:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4706:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48c27dd1-70d3-410d-819f-b2111d5875e9 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386642025-03-07T23:13:06.200ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1816 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 48c27dd1-70d3-410d-819f-b2111d5875e9 response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386652025-03-07T23:13:06.200ZINFOtest_unauthorized (external client test context): client received response status = 401
386662025-03-07T23:13:06.200ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
386672025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386682025-03-07T23:13:06.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 31ccd4b6-eead-488e-8c1b-a0b5a00f5b38 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386692025-03-07T23:13:06.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 31ccd4b6-eead-488e-8c1b-a0b5a00f5b38 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386702025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client received response status = 405
386712025-03-07T23:13:06.201ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
386722025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386732025-03-07T23:13:06.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 4a46d086-3c1c-45f6-93ba-675efc3890dc uri = /v1/instances/demo-instance/external-ips?project=demo-project
386742025-03-07T23:13:06.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 4a46d086-3c1c-45f6-93ba-675efc3890dc response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386752025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client received response status = 405
386762025-03-07T23:13:06.201ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
386772025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386782025-03-07T23:13:06.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 60eac66d-cc0e-4a05-88d9-8d7ebda6a0c9 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386792025-03-07T23:13:06.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 60eac66d-cc0e-4a05-88d9-8d7ebda6a0c9 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386802025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client received response status = 405
386812025-03-07T23:13:06.201ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
386822025-03-07T23:13:06.201ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386832025-03-07T23:13:06.202ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 429fd0fe-de27-406e-b374-2c622eddb9fb uri = /v1/instances/demo-instance/external-ips?project=demo-project
386842025-03-07T23:13:06.202ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 429fd0fe-de27-406e-b374-2c622eddb9fb response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386852025-03-07T23:13:06.202ZINFOtest_unauthorized (external client test context): client received response status = 405
386862025-03-07T23:13:06.202ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
386872025-03-07T23:13:06.202ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386882025-03-07T23:13:06.202ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = cf2de4e2-0911-49c7-9bf8-6a4cbbf80856 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386892025-03-07T23:13:06.206ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 4825 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = cf2de4e2-0911-49c7-9bf8-6a4cbbf80856 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386902025-03-07T23:13:06.207ZINFOtest_unauthorized (external client test context): client received response status = 405
386912025-03-07T23:13:06.208ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
386922025-03-07T23:13:06.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386932025-03-07T23:13:06.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 24f862d6-d4e7-4d70-9744-99ff1911d88a uri = /v1/instances/demo-instance/external-ips?project=demo-project
386942025-03-07T23:13:06.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1306 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 24f862d6-d4e7-4d70-9744-99ff1911d88a response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
386952025-03-07T23:13:06.210ZINFOtest_unauthorized (external client test context): client received response status = 405
386962025-03-07T23:13:06.210ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
386972025-03-07T23:13:06.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
386982025-03-07T23:13:06.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 749c6f89-3480-4bad-a92d-791213e89a6a uri = /v1/instances/demo-instance/external-ips?project=demo-project
386992025-03-07T23:13:06.211ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 239 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 749c6f89-3480-4bad-a92d-791213e89a6a response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387002025-03-07T23:13:06.211ZINFOtest_unauthorized (external client test context): client received response status = 405
387012025-03-07T23:13:06.211ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
387022025-03-07T23:13:06.211ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387032025-03-07T23:13:06.212ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 948427ed-7370-4570-8d07-273b34c1c4d8 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387042025-03-07T23:13:06.212ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 948427ed-7370-4570-8d07-273b34c1c4d8 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387052025-03-07T23:13:06.212ZINFOtest_unauthorized (external client test context): client received response status = 405
387062025-03-07T23:13:06.212ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
387072025-03-07T23:13:06.212ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387082025-03-07T23:13:06.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 24cf3e8e-8554-4453-9cd2-bae22ff7b9dc uri = /v1/instances/demo-instance/external-ips?project=demo-project
387092025-03-07T23:13:06.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 296 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 24cf3e8e-8554-4453-9cd2-bae22ff7b9dc response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387102025-03-07T23:13:06.224ZDEBGtest_unauthorized (results-sink): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
387112025-03-07T23:13:06.224ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
387122025-03-07T23:13:06.224ZDEBGtest_unauthorized (clickhouse-client): unrolling 2 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7
387132025-03-07T23:13:06.226ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
387142025-03-07T23:13:06.227ZINFOtest_unauthorized (external client test context): client received response status = 405
387152025-03-07T23:13:06.227ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
387162025-03-07T23:13:06.227ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387172025-03-07T23:13:06.228ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4d4187a2-8ada-4b57-a350-227563749e9b uri = /v1/instances/demo-instance/external-ips?project=demo-project
387182025-03-07T23:13:06.228ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 215 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 4d4187a2-8ada-4b57-a350-227563749e9b response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387192025-03-07T23:13:06.228ZINFOtest_unauthorized (external client test context): client received response status = 405
387202025-03-07T23:13:06.230ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
387212025-03-07T23:13:06.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387222025-03-07T23:13:06.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = b9b8df60-83ff-47d3-a998-51eca4d52cc3 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387232025-03-07T23:13:06.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = b9b8df60-83ff-47d3-a998-51eca4d52cc3 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387242025-03-07T23:13:06.230ZINFOtest_unauthorized (external client test context): client received response status = 405
387252025-03-07T23:13:06.230ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
387262025-03-07T23:13:06.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387272025-03-07T23:13:06.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 1cf87ece-af72-452b-9a92-dd616215d496 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387282025-03-07T23:13:06.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 1cf87ece-af72-452b-9a92-dd616215d496 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387292025-03-07T23:13:06.230ZINFOtest_unauthorized (external client test context): client received response status = 405
387302025-03-07T23:13:06.230ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
387312025-03-07T23:13:06.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387322025-03-07T23:13:06.231ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 488dfe5e-159b-49b0-ab4a-1fc9638e3f46 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387332025-03-07T23:13:06.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 488dfe5e-159b-49b0-ab4a-1fc9638e3f46 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387342025-03-07T23:13:06.232ZINFOtest_unauthorized (external client test context): client received response status = 405
387352025-03-07T23:13:06.232ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
387362025-03-07T23:13:06.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387372025-03-07T23:13:06.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 62fad71c-b28c-456e-9d3b-29fa4078ad72 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387382025-03-07T23:13:06.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 62fad71c-b28c-456e-9d3b-29fa4078ad72 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387392025-03-07T23:13:06.232ZINFOtest_unauthorized (external client test context): client received response status = 405
387402025-03-07T23:13:06.232ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
387412025-03-07T23:13:06.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387422025-03-07T23:13:06.233ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = fields_string
387432025-03-07T23:13:06.233ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
387442025-03-07T23:13:06.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 7aa94780-a19a-4ff5-916a-0591214f92e3 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387452025-03-07T23:13:06.234ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 7aa94780-a19a-4ff5-916a-0591214f92e3 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387462025-03-07T23:13:06.234ZINFOtest_unauthorized (external client test context): client received response status = 405
387472025-03-07T23:13:06.234ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
387482025-03-07T23:13:06.234ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387492025-03-07T23:13:06.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = c2d9309e-fc7a-40aa-a583-e0c599dd52ab uri = /v1/instances/demo-instance/external-ips?project=demo-project
387502025-03-07T23:13:06.234ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = c2d9309e-fc7a-40aa-a583-e0c599dd52ab response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387512025-03-07T23:13:06.235ZINFOtest_unauthorized (external client test context): client received response status = 405
387522025-03-07T23:13:06.235ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/external-ips?project=demo-project
387532025-03-07T23:13:06.235ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips?project=demo-project
387542025-03-07T23:13:06.235ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f uri = /v1/instances/demo-instance/external-ips?project=demo-project
387552025-03-07T23:13:06.236ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f uri = /v1/instances/demo-instance/external-ips?project=demo-project
387562025-03-07T23:13:06.236ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/external-ips?project=demo-project
387572025-03-07T23:13:06.236ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387582025-03-07T23:13:06.236ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387592025-03-07T23:13:06.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387602025-03-07T23:13:06.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387612025-03-07T23:13:06.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387622025-03-07T23:13:06.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387632025-03-07T23:13:06.245ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = df3de613-ca05-4441-b586-7faa72cb7af7 n_rows = 2 table_name = measurements_i64
387642025-03-07T23:13:06.245ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
387652025-03-07T23:13:06.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
387662025-03-07T23:13:06.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
387672025-03-07T23:13:06.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387682025-03-07T23:13:06.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387692025-03-07T23:13:06.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387702025-03-07T23:13:06.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
387712025-03-07T23:13:06.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387722025-03-07T23:13:06.254ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387732025-03-07T23:13:06.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387742025-03-07T23:13:06.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
387752025-03-07T23:13:06.262ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
387762025-03-07T23:13:06.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387772025-03-07T23:13:06.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387782025-03-07T23:13:06.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387792025-03-07T23:13:06.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
387802025-03-07T23:13:06.267ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
387812025-03-07T23:13:06.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387822025-03-07T23:13:06.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387832025-03-07T23:13:06.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387842025-03-07T23:13:06.273ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
387852025-03-07T23:13:06.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387862025-03-07T23:13:06.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387872025-03-07T23:13:06.274ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387882025-03-07T23:13:06.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
387892025-03-07T23:13:06.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
387902025-03-07T23:13:06.287ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f uri = /v1/instances/demo-instance/external-ips?project=demo-project
387912025-03-07T23:13:06.288ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
387922025-03-07T23:13:06.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
387932025-03-07T23:13:06.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
387942025-03-07T23:13:06.291ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
387952025-03-07T23:13:06.291ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
387962025-03-07T23:13:06.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
387972025-03-07T23:13:06.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
387982025-03-07T23:13:06.296ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
387992025-03-07T23:13:06.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388002025-03-07T23:13:06.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388012025-03-07T23:13:06.298ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
388022025-03-07T23:13:06.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388032025-03-07T23:13:06.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388042025-03-07T23:13:06.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388052025-03-07T23:13:06.301ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
388062025-03-07T23:13:06.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388072025-03-07T23:13:06.301ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388082025-03-07T23:13:06.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388092025-03-07T23:13:06.307ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
388102025-03-07T23:13:06.308ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388112025-03-07T23:13:06.308ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388122025-03-07T23:13:06.308ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388132025-03-07T23:13:06.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388142025-03-07T23:13:06.329ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388152025-03-07T23:13:06.329ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388162025-03-07T23:13:06.329ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388172025-03-07T23:13:06.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388182025-03-07T23:13:06.333ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
388192025-03-07T23:13:06.334ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 99022 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8dc2b1b7-8c7c-4dc4-971c-a5fd79b6138f response_code = 200 uri = /v1/instances/demo-instance/external-ips?project=demo-project
388202025-03-07T23:13:06.335ZINFOtest_unauthorized (external client test context): client received response status = 200
388212025-03-07T23:13:06.337ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388222025-03-07T23:13:06.337ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388232025-03-07T23:13:06.337ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388242025-03-07T23:13:06.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388252025-03-07T23:13:06.337ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = f60d7f91-fb7d-4bda-8b2d-9d00d1f5c3aa uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388262025-03-07T23:13:06.337ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 104 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = f60d7f91-fb7d-4bda-8b2d-9d00d1f5c3aa response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388272025-03-07T23:13:06.337ZINFOtest_unauthorized (external client test context): client received response status = 405
388282025-03-07T23:13:06.337ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388292025-03-07T23:13:06.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388302025-03-07T23:13:06.337ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 14f48cb2-2dde-49da-9f62-7f53ac27facb uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388312025-03-07T23:13:06.337ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 14f48cb2-2dde-49da-9f62-7f53ac27facb response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388322025-03-07T23:13:06.337ZINFOtest_unauthorized (external client test context): client received response status = 405
388332025-03-07T23:13:06.337ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388342025-03-07T23:13:06.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388352025-03-07T23:13:06.338ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 400c72a9-e90d-43cb-8b72-7970ba1d6d21 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388362025-03-07T23:13:06.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 400c72a9-e90d-43cb-8b72-7970ba1d6d21 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388372025-03-07T23:13:06.339ZINFOtest_unauthorized (external client test context): client received response status = 405
388382025-03-07T23:13:06.339ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388392025-03-07T23:13:06.339ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388402025-03-07T23:13:06.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8371959c-b882-495c-94fc-6d341d113dcf uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388412025-03-07T23:13:06.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 8371959c-b882-495c-94fc-6d341d113dcf response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388422025-03-07T23:13:06.339ZINFOtest_unauthorized (external client test context): client received response status = 405
388432025-03-07T23:13:06.339ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388442025-03-07T23:13:06.339ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388452025-03-07T23:13:06.339ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = be4e964c-e3f2-4d86-89f2-47a659c3a11c uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388462025-03-07T23:13:06.339ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = be4e964c-e3f2-4d86-89f2-47a659c3a11c response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388472025-03-07T23:13:06.339ZINFOtest_unauthorized (external client test context): client received response status = 405
388482025-03-07T23:13:06.339ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388492025-03-07T23:13:06.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388502025-03-07T23:13:06.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 1c691cfc-e71a-4862-89b6-ee079bf7329a uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388512025-03-07T23:13:06.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 1c691cfc-e71a-4862-89b6-ee079bf7329a response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388522025-03-07T23:13:06.340ZINFOtest_unauthorized (external client test context): client received response status = 405
388532025-03-07T23:13:06.340ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388542025-03-07T23:13:06.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388552025-03-07T23:13:06.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 261f4035-e94f-4ee8-a99f-87d8a1d1ab6e uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388562025-03-07T23:13:06.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 261f4035-e94f-4ee8-a99f-87d8a1d1ab6e response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388572025-03-07T23:13:06.340ZINFOtest_unauthorized (external client test context): client received response status = 405
388582025-03-07T23:13:06.340ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388592025-03-07T23:13:06.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388602025-03-07T23:13:06.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 14b47ff0-b165-4eb9-9a26-73b6be2dcaf8 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388612025-03-07T23:13:06.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 14b47ff0-b165-4eb9-9a26-73b6be2dcaf8 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388622025-03-07T23:13:06.341ZINFOtest_unauthorized (external client test context): client received response status = 405
388632025-03-07T23:13:06.341ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388642025-03-07T23:13:06.341ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388652025-03-07T23:13:06.341ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388662025-03-07T23:13:06.341ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388672025-03-07T23:13:06.341ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
388682025-03-07T23:13:06.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388692025-03-07T23:13:06.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388702025-03-07T23:13:06.342ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388712025-03-07T23:13:06.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388722025-03-07T23:13:06.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388732025-03-07T23:13:06.346ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388742025-03-07T23:13:06.348ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
388752025-03-07T23:13:06.348ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
388762025-03-07T23:13:06.348ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388772025-03-07T23:13:06.348ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388782025-03-07T23:13:06.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388792025-03-07T23:13:06.350ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
388802025-03-07T23:13:06.350ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388812025-03-07T23:13:06.352ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388822025-03-07T23:13:06.352ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388832025-03-07T23:13:06.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
388842025-03-07T23:13:06.358ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
388852025-03-07T23:13:06.363ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388862025-03-07T23:13:06.363ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388872025-03-07T23:13:06.363ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388882025-03-07T23:13:06.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
388892025-03-07T23:13:06.376ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
388902025-03-07T23:13:06.376ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388912025-03-07T23:13:06.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388922025-03-07T23:13:06.377ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388932025-03-07T23:13:06.385ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
388942025-03-07T23:13:06.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388952025-03-07T23:13:06.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388962025-03-07T23:13:06.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388972025-03-07T23:13:06.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
388982025-03-07T23:13:06.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
388992025-03-07T23:13:06.396ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389002025-03-07T23:13:06.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389012025-03-07T23:13:06.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389022025-03-07T23:13:06.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389032025-03-07T23:13:06.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389042025-03-07T23:13:06.401ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389052025-03-07T23:13:06.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389062025-03-07T23:13:06.404ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389072025-03-07T23:13:06.406ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389082025-03-07T23:13:06.406ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389092025-03-07T23:13:06.407ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389102025-03-07T23:13:06.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389112025-03-07T23:13:06.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389122025-03-07T23:13:06.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389132025-03-07T23:13:06.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389142025-03-07T23:13:06.414ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389152025-03-07T23:13:06.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389162025-03-07T23:13:06.415ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389172025-03-07T23:13:06.415ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389182025-03-07T23:13:06.417ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389192025-03-07T23:13:06.417ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389202025-03-07T23:13:06.417ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389212025-03-07T23:13:06.417ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389222025-03-07T23:13:06.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389232025-03-07T23:13:06.455ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389242025-03-07T23:13:06.464ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 122861 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = f70b51ba-4832-4d32-a8fa-8efe944279f5 response_code = 404 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389252025-03-07T23:13:06.465ZINFOtest_unauthorized (external client test context): client received response status = 404
389262025-03-07T23:13:06.467ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389272025-03-07T23:13:06.467ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389282025-03-07T23:13:06.467ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = d08456a6-ba03-45be-a776-08fa3887e8e5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389292025-03-07T23:13:06.467ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = d08456a6-ba03-45be-a776-08fa3887e8e5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389302025-03-07T23:13:06.467ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = d08456a6-ba03-45be-a776-08fa3887e8e5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389312025-03-07T23:13:06.469ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = d08456a6-ba03-45be-a776-08fa3887e8e5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389322025-03-07T23:13:06.469ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 523 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = d08456a6-ba03-45be-a776-08fa3887e8e5 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389332025-03-07T23:13:06.469ZINFOtest_unauthorized (external client test context): client received response status = 401
389342025-03-07T23:13:06.469ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389352025-03-07T23:13:06.469ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389362025-03-07T23:13:06.469ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e58e5160-507e-47f6-b6db-ba366e97a39d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389372025-03-07T23:13:06.469ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e58e5160-507e-47f6-b6db-ba366e97a39d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389382025-03-07T23:13:06.469ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e58e5160-507e-47f6-b6db-ba366e97a39d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389392025-03-07T23:13:06.469ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 313 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e58e5160-507e-47f6-b6db-ba366e97a39d response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389402025-03-07T23:13:06.469ZINFOtest_unauthorized (external client test context): client received response status = 401
389412025-03-07T23:13:06.469ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389422025-03-07T23:13:06.471ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389432025-03-07T23:13:06.471ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = ee3d3f50-df29-4cf1-abd8-69c2ca728190 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389442025-03-07T23:13:06.471ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = ee3d3f50-df29-4cf1-abd8-69c2ca728190 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389452025-03-07T23:13:06.471ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4718:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4741:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = ee3d3f50-df29-4cf1-abd8-69c2ca728190 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389462025-03-07T23:13:06.471ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1124 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = ee3d3f50-df29-4cf1-abd8-69c2ca728190 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389472025-03-07T23:13:06.471ZINFOtest_unauthorized (external client test context): client received response status = 401
389482025-03-07T23:13:06.471ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389492025-03-07T23:13:06.472ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389502025-03-07T23:13:06.472ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389512025-03-07T23:13:06.472ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389522025-03-07T23:13:06.472ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389532025-03-07T23:13:06.472ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389542025-03-07T23:13:06.472ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389552025-03-07T23:13:06.474ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389562025-03-07T23:13:06.476ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389572025-03-07T23:13:06.477ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389582025-03-07T23:13:06.477ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389592025-03-07T23:13:06.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
389602025-03-07T23:13:06.480ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
389612025-03-07T23:13:06.480ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389622025-03-07T23:13:06.480ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389632025-03-07T23:13:06.480ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389642025-03-07T23:13:06.483ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
389652025-03-07T23:13:06.483ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389662025-03-07T23:13:06.483ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389672025-03-07T23:13:06.484ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389682025-03-07T23:13:06.486ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
389692025-03-07T23:13:06.490ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
389702025-03-07T23:13:06.492ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389712025-03-07T23:13:06.492ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389722025-03-07T23:13:06.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389732025-03-07T23:13:06.494ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
389742025-03-07T23:13:06.495ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
389752025-03-07T23:13:06.497ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389762025-03-07T23:13:06.497ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389772025-03-07T23:13:06.497ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389782025-03-07T23:13:06.497ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
389792025-03-07T23:13:06.497ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389802025-03-07T23:13:06.497ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389812025-03-07T23:13:06.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389822025-03-07T23:13:06.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
389832025-03-07T23:13:06.504ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
389842025-03-07T23:13:06.505ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389852025-03-07T23:13:06.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389862025-03-07T23:13:06.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389872025-03-07T23:13:06.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389882025-03-07T23:13:06.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389892025-03-07T23:13:06.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389902025-03-07T23:13:06.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389912025-03-07T23:13:06.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389922025-03-07T23:13:06.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389932025-03-07T23:13:06.513ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389942025-03-07T23:13:06.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389952025-03-07T23:13:06.516ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389962025-03-07T23:13:06.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389972025-03-07T23:13:06.516ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389982025-03-07T23:13:06.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
389992025-03-07T23:13:06.523ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390002025-03-07T23:13:06.524ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390012025-03-07T23:13:06.524ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390022025-03-07T23:13:06.524ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390032025-03-07T23:13:06.526ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390042025-03-07T23:13:06.526ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390052025-03-07T23:13:06.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390062025-03-07T23:13:06.528ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390072025-03-07T23:13:06.535ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390082025-03-07T23:13:06.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390092025-03-07T23:13:06.556ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 85730 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2eb7f995-954c-46a3-8ad8-3fb0d2e31e07 response_code = 404 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390102025-03-07T23:13:06.557ZINFOtest_unauthorized (external client test context): client received response status = 404
390112025-03-07T23:13:06.557ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390122025-03-07T23:13:06.557ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390132025-03-07T23:13:06.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = f763f47c-eef4-4e5c-beff-6b8925040e87 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390142025-03-07T23:13:06.558ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = f763f47c-eef4-4e5c-beff-6b8925040e87 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390152025-03-07T23:13:06.559ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = f763f47c-eef4-4e5c-beff-6b8925040e87 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390162025-03-07T23:13:06.559ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = f763f47c-eef4-4e5c-beff-6b8925040e87 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390172025-03-07T23:13:06.559ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 448 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = f763f47c-eef4-4e5c-beff-6b8925040e87 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390182025-03-07T23:13:06.559ZINFOtest_unauthorized (external client test context): client received response status = 401
390192025-03-07T23:13:06.559ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390202025-03-07T23:13:06.559ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390212025-03-07T23:13:06.559ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2a1d6f91-3365-4011-a08c-e058dd82c78b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390222025-03-07T23:13:06.560ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2a1d6f91-3365-4011-a08c-e058dd82c78b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390232025-03-07T23:13:06.561ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2a1d6f91-3365-4011-a08c-e058dd82c78b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390242025-03-07T23:13:06.561ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 845 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 2a1d6f91-3365-4011-a08c-e058dd82c78b response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390252025-03-07T23:13:06.561ZINFOtest_unauthorized (external client test context): client received response status = 401
390262025-03-07T23:13:06.561ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390272025-03-07T23:13:06.561ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390282025-03-07T23:13:06.561ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 647fbe56-1f47-44e1-9136-348a45d7e184 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390292025-03-07T23:13:06.561ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 647fbe56-1f47-44e1-9136-348a45d7e184 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390302025-03-07T23:13:06.562ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4752:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4775:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 647fbe56-1f47-44e1-9136-348a45d7e184 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390312025-03-07T23:13:06.562ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 914 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 647fbe56-1f47-44e1-9136-348a45d7e184 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390322025-03-07T23:13:06.563ZINFOtest_unauthorized (external client test context): client received response status = 401
390332025-03-07T23:13:06.563ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390342025-03-07T23:13:06.563ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390352025-03-07T23:13:06.563ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = a86ed035-2fb6-4141-b8e6-431a9b90e436 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390362025-03-07T23:13:06.563ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 177 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = a86ed035-2fb6-4141-b8e6-431a9b90e436 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390372025-03-07T23:13:06.564ZINFOtest_unauthorized (external client test context): client received response status = 405
390382025-03-07T23:13:06.565ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390392025-03-07T23:13:06.565ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390402025-03-07T23:13:06.565ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = ae0d2b9a-c09e-48c1-8b4f-488dc566288a uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390412025-03-07T23:13:06.565ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = ae0d2b9a-c09e-48c1-8b4f-488dc566288a response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390422025-03-07T23:13:06.565ZINFOtest_unauthorized (external client test context): client received response status = 405
390432025-03-07T23:13:06.565ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390442025-03-07T23:13:06.565ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390452025-03-07T23:13:06.565ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 66226ea3-5075-4392-849f-953442f06df9 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390462025-03-07T23:13:06.565ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 66226ea3-5075-4392-849f-953442f06df9 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390472025-03-07T23:13:06.566ZINFOtest_unauthorized (external client test context): client received response status = 405
390482025-03-07T23:13:06.566ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390492025-03-07T23:13:06.566ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390502025-03-07T23:13:06.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 52cc85a6-e1a8-4288-b42b-3db9943119fd uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390512025-03-07T23:13:06.566ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 52cc85a6-e1a8-4288-b42b-3db9943119fd response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390522025-03-07T23:13:06.566ZINFOtest_unauthorized (external client test context): client received response status = 405
390532025-03-07T23:13:06.566ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
390542025-03-07T23:13:06.566ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390552025-03-07T23:13:06.567ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390562025-03-07T23:13:06.567ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
390572025-03-07T23:13:06.567ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390582025-03-07T23:13:06.567ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390592025-03-07T23:13:06.567ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390602025-03-07T23:13:06.567ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390612025-03-07T23:13:06.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390622025-03-07T23:13:06.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390632025-03-07T23:13:06.574ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390642025-03-07T23:13:06.574ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390652025-03-07T23:13:06.575ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390662025-03-07T23:13:06.577ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
390672025-03-07T23:13:06.577ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
390682025-03-07T23:13:06.577ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390692025-03-07T23:13:06.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390702025-03-07T23:13:06.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390712025-03-07T23:13:06.581ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
390722025-03-07T23:13:06.581ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390732025-03-07T23:13:06.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390742025-03-07T23:13:06.582ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390752025-03-07T23:13:06.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
390762025-03-07T23:13:06.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
390772025-03-07T23:13:06.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390782025-03-07T23:13:06.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390792025-03-07T23:13:06.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390802025-03-07T23:13:06.594ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390812025-03-07T23:13:06.594ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390822025-03-07T23:13:06.596ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
390832025-03-07T23:13:06.597ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
390842025-03-07T23:13:06.597ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390852025-03-07T23:13:06.597ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390862025-03-07T23:13:06.597ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390872025-03-07T23:13:06.598ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390882025-03-07T23:13:06.599ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390892025-03-07T23:13:06.599ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390902025-03-07T23:13:06.599ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
390912025-03-07T23:13:06.600ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
390922025-03-07T23:13:06.602ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390932025-03-07T23:13:06.602ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390942025-03-07T23:13:06.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390952025-03-07T23:13:06.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
390962025-03-07T23:13:06.609ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
390972025-03-07T23:13:06.609ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390982025-03-07T23:13:06.609ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
390992025-03-07T23:13:06.609ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391002025-03-07T23:13:06.610ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391012025-03-07T23:13:06.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391022025-03-07T23:13:06.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391032025-03-07T23:13:06.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391042025-03-07T23:13:06.615ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391052025-03-07T23:13:06.615ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391062025-03-07T23:13:06.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391072025-03-07T23:13:06.619ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391082025-03-07T23:13:06.619ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391092025-03-07T23:13:06.619ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391102025-03-07T23:13:06.619ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391112025-03-07T23:13:06.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391122025-03-07T23:13:06.621ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391132025-03-07T23:13:06.621ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391142025-03-07T23:13:06.621ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391152025-03-07T23:13:06.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391162025-03-07T23:13:06.626ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391172025-03-07T23:13:06.626ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391182025-03-07T23:13:06.628ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391192025-03-07T23:13:06.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391202025-03-07T23:13:06.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391212025-03-07T23:13:06.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391222025-03-07T23:13:06.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391232025-03-07T23:13:06.641ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391242025-03-07T23:13:06.641ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391252025-03-07T23:13:06.644ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 77673 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 757e948a-81f8-41a1-9fd1-4e10a8cc6776 response_code = 200 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391262025-03-07T23:13:06.646ZINFOtest_unauthorized (external client test context): client received response status = 200
391272025-03-07T23:13:06.646ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391282025-03-07T23:13:06.646ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
391292025-03-07T23:13:06.646ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391302025-03-07T23:13:06.646ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391312025-03-07T23:13:06.646ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391322025-03-07T23:13:06.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391332025-03-07T23:13:06.646ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391342025-03-07T23:13:06.647ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391352025-03-07T23:13:06.650ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391362025-03-07T23:13:06.651ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391372025-03-07T23:13:06.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391382025-03-07T23:13:06.653ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
391392025-03-07T23:13:06.654ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
391402025-03-07T23:13:06.654ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391412025-03-07T23:13:06.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391422025-03-07T23:13:06.655ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391432025-03-07T23:13:06.661ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
391442025-03-07T23:13:06.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391452025-03-07T23:13:06.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391462025-03-07T23:13:06.662ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391472025-03-07T23:13:06.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
391482025-03-07T23:13:06.668ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
391492025-03-07T23:13:06.668ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391502025-03-07T23:13:06.668ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391512025-03-07T23:13:06.670ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391522025-03-07T23:13:06.674ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
391532025-03-07T23:13:06.676ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
391542025-03-07T23:13:06.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391552025-03-07T23:13:06.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391562025-03-07T23:13:06.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391572025-03-07T23:13:06.688ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
391582025-03-07T23:13:06.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391592025-03-07T23:13:06.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391602025-03-07T23:13:06.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391612025-03-07T23:13:06.705ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
391622025-03-07T23:13:06.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
391632025-03-07T23:13:06.710ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391642025-03-07T23:13:06.710ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391652025-03-07T23:13:06.710ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391662025-03-07T23:13:06.710ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391672025-03-07T23:13:06.712ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391682025-03-07T23:13:06.713ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391692025-03-07T23:13:06.714ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391702025-03-07T23:13:06.715ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391712025-03-07T23:13:06.716ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391722025-03-07T23:13:06.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391732025-03-07T23:13:06.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391742025-03-07T23:13:06.720ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391752025-03-07T23:13:06.720ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391762025-03-07T23:13:06.720ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391772025-03-07T23:13:06.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391782025-03-07T23:13:06.721ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391792025-03-07T23:13:06.722ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391802025-03-07T23:13:06.722ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391812025-03-07T23:13:06.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391822025-03-07T23:13:06.725ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391832025-03-07T23:13:06.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391842025-03-07T23:13:06.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391852025-03-07T23:13:06.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391862025-03-07T23:13:06.730ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391872025-03-07T23:13:06.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391882025-03-07T23:13:06.755ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 108879 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 1abf75ca-5656-4e48-b0cb-274f326aa240 response_code = 404 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391892025-03-07T23:13:06.755ZINFOtest_unauthorized (external client test context): client received response status = 404
391902025-03-07T23:13:06.755ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391912025-03-07T23:13:06.755ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
391922025-03-07T23:13:06.755ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e7cac0c4-7812-4207-83fa-dc03dfca9278 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391932025-03-07T23:13:06.755ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e7cac0c4-7812-4207-83fa-dc03dfca9278 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391942025-03-07T23:13:06.755ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e7cac0c4-7812-4207-83fa-dc03dfca9278 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391952025-03-07T23:13:06.756ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e7cac0c4-7812-4207-83fa-dc03dfca9278 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391962025-03-07T23:13:06.756ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 383 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = e7cac0c4-7812-4207-83fa-dc03dfca9278 response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391972025-03-07T23:13:06.756ZINFOtest_unauthorized (external client test context): client received response status = 401
391982025-03-07T23:13:06.757ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
391992025-03-07T23:13:06.757ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392002025-03-07T23:13:06.757ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = be2c1994-4470-4024-a3d8-0c08aa5e2b40 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392012025-03-07T23:13:06.758ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = be2c1994-4470-4024-a3d8-0c08aa5e2b40 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392022025-03-07T23:13:06.758ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = be2c1994-4470-4024-a3d8-0c08aa5e2b40 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392032025-03-07T23:13:06.759ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 751 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = be2c1994-4470-4024-a3d8-0c08aa5e2b40 response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392042025-03-07T23:13:06.759ZINFOtest_unauthorized (external client test context): client received response status = 401
392052025-03-07T23:13:06.759ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392062025-03-07T23:13:06.759ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392072025-03-07T23:13:06.762ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 02ef7b3b-301a-40ef-9b21-dffcc182ce4c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392082025-03-07T23:13:06.762ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 02ef7b3b-301a-40ef-9b21-dffcc182ce4c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392092025-03-07T23:13:06.764ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2379:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2402:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: <unknown> 78: <unknown> } }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 02ef7b3b-301a-40ef-9b21-dffcc182ce4c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392102025-03-07T23:13:06.764ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1464 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 02ef7b3b-301a-40ef-9b21-dffcc182ce4c response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392112025-03-07T23:13:06.768ZINFOtest_unauthorized (external client test context): client received response status = 401
392122025-03-07T23:13:06.770ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392132025-03-07T23:13:06.770ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392142025-03-07T23:13:06.770ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 2f87f29b-f03e-4792-ba84-7077f0e9b43e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392152025-03-07T23:13:06.770ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 2f87f29b-f03e-4792-ba84-7077f0e9b43e response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392162025-03-07T23:13:06.772ZINFOtest_unauthorized (external client test context): client received response status = 405
392172025-03-07T23:13:06.772ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392182025-03-07T23:13:06.772ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392192025-03-07T23:13:06.774ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 5a1193fd-252c-46f2-a3f8-3431d5cf494b uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392202025-03-07T23:13:06.774ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 5a1193fd-252c-46f2-a3f8-3431d5cf494b response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392212025-03-07T23:13:06.777ZINFOtest_unauthorized (external client test context): client received response status = 405
392222025-03-07T23:13:06.777ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392232025-03-07T23:13:06.777ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392242025-03-07T23:13:06.777ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = efda6e95-c762-4f33-b4fb-09c96ae4dc08 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392252025-03-07T23:13:06.779ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = efda6e95-c762-4f33-b4fb-09c96ae4dc08 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392262025-03-07T23:13:06.779ZINFOtest_unauthorized (external client test context): client received response status = 405
392272025-03-07T23:13:06.780ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392282025-03-07T23:13:06.780ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392292025-03-07T23:13:06.786ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 14c678c7-fb76-4943-9ab0-d0cd172aa117 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392302025-03-07T23:13:06.786ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 119 local_addr = 127.0.0.1:41589 method = PUT remote_addr = 127.0.0.1:53904 req_id = 14c678c7-fb76-4943-9ab0-d0cd172aa117 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392312025-03-07T23:13:06.791ZINFOtest_unauthorized (external client test context): client received response status = 405
392322025-03-07T23:13:06.792ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392332025-03-07T23:13:06.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392342025-03-07T23:13:06.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b315a5a3-70ff-4e47-ba25-8422b37f3f96 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392352025-03-07T23:13:06.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = b315a5a3-70ff-4e47-ba25-8422b37f3f96 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392362025-03-07T23:13:06.792ZINFOtest_unauthorized (external client test context): client received response status = 405
392372025-03-07T23:13:06.792ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392382025-03-07T23:13:06.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392392025-03-07T23:13:06.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e744510a-fea5-4cc5-abfa-02f923610a3b uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392402025-03-07T23:13:06.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = e744510a-fea5-4cc5-abfa-02f923610a3b response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392412025-03-07T23:13:06.793ZINFOtest_unauthorized (external client test context): client received response status = 405
392422025-03-07T23:13:06.793ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392432025-03-07T23:13:06.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392442025-03-07T23:13:06.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 8577191f-1f09-4a45-9ee5-35292805a3a0 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392452025-03-07T23:13:06.794ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 153 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = 8577191f-1f09-4a45-9ee5-35292805a3a0 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392462025-03-07T23:13:06.794ZINFOtest_unauthorized (external client test context): client received response status = 405
392472025-03-07T23:13:06.794ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392482025-03-07T23:13:06.794ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392492025-03-07T23:13:06.794ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = cb445d83-86e5-4169-8de4-758c90938902 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392502025-03-07T23:13:06.794ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:41589 method = POST remote_addr = 127.0.0.1:53904 req_id = cb445d83-86e5-4169-8de4-758c90938902 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392512025-03-07T23:13:06.794ZINFOtest_unauthorized (external client test context): client received response status = 405
392522025-03-07T23:13:06.795ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392532025-03-07T23:13:06.795ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392542025-03-07T23:13:06.795ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 3aba9cca-18c9-4a54-bc9a-4da1f6d48f37 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392552025-03-07T23:13:06.795ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 3aba9cca-18c9-4a54-bc9a-4da1f6d48f37 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392562025-03-07T23:13:06.795ZINFOtest_unauthorized (external client test context): client received response status = 405
392572025-03-07T23:13:06.799ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392582025-03-07T23:13:06.799ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392592025-03-07T23:13:06.800ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 7002c594-52d2-4273-a198-b67dd81beabd uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392602025-03-07T23:13:06.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 7002c594-52d2-4273-a198-b67dd81beabd response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392612025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client received response status = 405
392622025-03-07T23:13:06.801ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392632025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392642025-03-07T23:13:06.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 9d77544b-ff1c-4306-816d-077d08b7b628 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392652025-03-07T23:13:06.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = 9d77544b-ff1c-4306-816d-077d08b7b628 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392662025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client received response status = 405
392672025-03-07T23:13:06.801ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392682025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392692025-03-07T23:13:06.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = c9758641-e41a-430a-8cd6-0833420b0bd7 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392702025-03-07T23:13:06.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:41589 method = DELETE remote_addr = 127.0.0.1:53904 req_id = c9758641-e41a-430a-8cd6-0833420b0bd7 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392712025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client received response status = 405
392722025-03-07T23:13:06.801ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392732025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392742025-03-07T23:13:06.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = e9e155b9-95e4-400b-9756-551bc5f15b24 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392752025-03-07T23:13:06.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = e9e155b9-95e4-400b-9756-551bc5f15b24 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392762025-03-07T23:13:06.801ZINFOtest_unauthorized (external client test context): client received response status = 405
392772025-03-07T23:13:06.801ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392782025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392792025-03-07T23:13:06.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 02c85f81-a677-433f-bfd2-1d9ed13276eb uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392802025-03-07T23:13:06.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 02c85f81-a677-433f-bfd2-1d9ed13276eb response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392812025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client received response status = 405
392822025-03-07T23:13:06.802ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392832025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392842025-03-07T23:13:06.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 1e3f8e85-fb2e-4529-acef-0f1bc3d98cf3 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392852025-03-07T23:13:06.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 1e3f8e85-fb2e-4529-acef-0f1bc3d98cf3 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392862025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client received response status = 405
392872025-03-07T23:13:06.802ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392882025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392892025-03-07T23:13:06.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 80c4fc23-9f76-4b9a-abd6-658424e8b711 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392902025-03-07T23:13:06.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:41589 method = TRACE remote_addr = 127.0.0.1:53904 req_id = 80c4fc23-9f76-4b9a-abd6-658424e8b711 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392912025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client received response status = 405
392922025-03-07T23:13:06.802ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392932025-03-07T23:13:06.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/instances/demo-instance/ssh-public-keys?project=demo-project
392942025-03-07T23:13:06.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392952025-03-07T23:13:06.802ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392962025-03-07T23:13:06.802ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
392972025-03-07T23:13:06.802ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392982025-03-07T23:13:06.802ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392992025-03-07T23:13:06.802ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393002025-03-07T23:13:06.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393012025-03-07T23:13:06.805ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393022025-03-07T23:13:06.805ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393032025-03-07T23:13:06.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
393042025-03-07T23:13:06.807ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393052025-03-07T23:13:06.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393062025-03-07T23:13:06.807ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393072025-03-07T23:13:06.808ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393082025-03-07T23:13:06.811ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393092025-03-07T23:13:06.812ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393102025-03-07T23:13:06.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393112025-03-07T23:13:06.813ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393122025-03-07T23:13:06.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
393132025-03-07T23:13:06.817ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
393142025-03-07T23:13:06.817ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393152025-03-07T23:13:06.817ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393162025-03-07T23:13:06.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393172025-03-07T23:13:06.819ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
393182025-03-07T23:13:06.820ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393192025-03-07T23:13:06.820ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393202025-03-07T23:13:06.820ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393212025-03-07T23:13:06.820ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393222025-03-07T23:13:06.823ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393232025-03-07T23:13:06.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393242025-03-07T23:13:06.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393252025-03-07T23:13:06.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393262025-03-07T23:13:06.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
393272025-03-07T23:13:06.829ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
393282025-03-07T23:13:06.830ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393292025-03-07T23:13:06.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393302025-03-07T23:13:06.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393312025-03-07T23:13:06.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393322025-03-07T23:13:06.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393332025-03-07T23:13:06.835ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393342025-03-07T23:13:06.835ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393352025-03-07T23:13:06.837ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393362025-03-07T23:13:06.837ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393372025-03-07T23:13:06.838ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393382025-03-07T23:13:06.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393392025-03-07T23:13:06.843ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource_id = 12ae9422-28d6-4476-8e2f-3bf8240cdde8 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393402025-03-07T23:13:06.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393412025-03-07T23:13:06.843ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393422025-03-07T23:13:06.843ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393432025-03-07T23:13:06.843ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393442025-03-07T23:13:06.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393452025-03-07T23:13:06.844ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393462025-03-07T23:13:06.844ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393472025-03-07T23:13:06.846ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393482025-03-07T23:13:06.852ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393492025-03-07T23:13:06.852ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393502025-03-07T23:13:06.852ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393512025-03-07T23:13:06.852ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393522025-03-07T23:13:06.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 12ae9422-28d6-4476-8e2f-3bf8240cdde8, lookup_type: ByName("demo-project") }, key: 3b345e54-8ce1-4328-8e77-7cf9ee33a84e, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393532025-03-07T23:13:06.858ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393542025-03-07T23:13:06.859ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393552025-03-07T23:13:06.859ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393562025-03-07T23:13:06.870ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 71344 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 62b82c9f-c721-4dcb-9a25-16683cb82d7c response_code = 200 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393572025-03-07T23:13:06.873ZINFOtest_unauthorized (external client test context): client received response status = 200
393582025-03-07T23:13:06.874ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/roles
393592025-03-07T23:13:06.874ZINFOtest_unauthorized: test: privileged GET url = /v1/system/roles
393602025-03-07T23:13:06.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:41589/v1/system/roles
393612025-03-07T23:13:06.874ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa uri = /v1/system/roles
393622025-03-07T23:13:06.874ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa uri = /v1/system/roles
393632025-03-07T23:13:06.874ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/roles
393642025-03-07T23:13:06.874ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393652025-03-07T23:13:06.875ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393662025-03-07T23:13:06.875ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393672025-03-07T23:13:06.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393682025-03-07T23:13:06.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393692025-03-07T23:13:06.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393702025-03-07T23:13:06.904ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
393712025-03-07T23:13:06.907ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393722025-03-07T23:13:06.907ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393732025-03-07T23:13:06.907ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393742025-03-07T23:13:06.908ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393752025-03-07T23:13:06.911ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393762025-03-07T23:13:06.911ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393772025-03-07T23:13:06.911ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393782025-03-07T23:13:06.913ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393792025-03-07T23:13:06.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
393802025-03-07T23:13:06.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
393812025-03-07T23:13:06.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393822025-03-07T23:13:06.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393832025-03-07T23:13:06.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393842025-03-07T23:13:06.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
393852025-03-07T23:13:06.927ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393862025-03-07T23:13:06.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393872025-03-07T23:13:06.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393882025-03-07T23:13:06.930ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393892025-03-07T23:13:06.931ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
393902025-03-07T23:13:06.931ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
393912025-03-07T23:13:06.931ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
393922025-03-07T23:13:06.932ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
393932025-03-07T23:13:06.935ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
393942025-03-07T23:13:06.935ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
393952025-03-07T23:13:06.935ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
393962025-03-07T23:13:06.937ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 111, kind: ConnectionRefused, message: "Connection refused" })) })
393972025-03-07T23:13:06.937ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 111): Connection refused (os error 111) zone_address = ::1
393982025-03-07T23:13:06.937ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393992025-03-07T23:13:06.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394002025-03-07T23:13:06.937ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394012025-03-07T23:13:06.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394022025-03-07T23:13:06.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
394032025-03-07T23:13:06.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
394042025-03-07T23:13:06.951ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa uri = /v1/system/roles
394052025-03-07T23:13:06.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Fleet uri = /v1/system/roles
394062025-03-07T23:13:06.952ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/roles
394072025-03-07T23:13:06.952ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Database uri = /v1/system/roles
394082025-03-07T23:13:06.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa roles = RoleSet { roles: {} } uri = /v1/system/roles
394092025-03-07T23:13:06.952ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Database result = Ok(()) uri = /v1/system/roles
394102025-03-07T23:13:06.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/roles
394112025-03-07T23:13:06.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Fleet result = Ok(()) uri = /v1/system/roles
394122025-03-07T23:13:06.961ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Database uri = /v1/system/roles
394132025-03-07T23:13:06.961ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa roles = RoleSet { roles: {} } uri = /v1/system/roles
394142025-03-07T23:13:06.962ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa resource = Database result = Ok(()) uri = /v1/system/roles
394152025-03-07T23:13:06.964ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Internal Server Error error_message_internal = unexpected database error: column "resource_type" does not exist latency_us = 90760 local_addr = 127.0.0.1:41589 method = GET remote_addr = 127.0.0.1:53904 req_id = 60632bd2-b3ae-412f-b9f9-9023757405fa response_code = 500 uri = /v1/system/roles
394162025-03-07T23:13:06.966ZINFOtest_unauthorized (external client test context): client received response status = 500